On Mon, 5 Feb 2001, Gerald Waugh wrote:
> "Rene Hendrix" <[EMAIL PROTECTED]> wrote
> > As promised we are releaseing the Bind 8 rpms for Raq2.
> > These RPMS have not been throughly tested by Quality Assurance, and
> > it is reccomended that you do not install these if you are not
> > familiar with rpm.
> >
> > Again, we expect these to be available in pkg format shortly.
> >
> > Location:
> > *** Please note that these rpms are not for the Qube2,
> > *** these will be release shortly
> > ftp://ftp/cobaltnet.com/pub/experimental/RPMS/mips/raq2/bind-8.2.3-C1.mips.rpm
> >
> ftp://ftp/cobaltnet.com/pub/experimental/RPMS/mips/raq2/bind-devel-8.2.3-C1.mips
> .rpm
> >
> ftp://ftp/cobaltnet.com/pub/experimental/RPMS/mips/raq2/bind-utils-8.2.3-C1.mips
> .rpm
> >
>
> The above URLs are defective Click-ON these instead, gee, maybe one day
> Cobalt/Sun will
> give us some good information.
>
> ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/raq2/bind-8.2.3-C1.mips.rpm
> ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/raq2/bind-devel-8.2.3-C1.mips
> .rpm
> ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/raq2/bind-utils-8.2.3-C1.mips
> .rpm
> What is
different about these RPMs versus the ones that were released a few days
> ago?????
> Gerald [EMAIL PROTECTED]
Yeah - wasn't exactly the same message sent to the list a few days ago by
somebody else, or am I seeing things?
Also, I'm still amused to see;
220 ProFTPD 1.2.0pre9 Server (ProFTPD) [ftp.cobaltnet.com]
220 ProFTPD 1.2.0pre8 Server (ProFTPD) [ftp.cobalt.com]
I don't really plan to keep downloading these patches from Cobalts FTP
servers if they run completely ownable FTP sites.
>From bugtraq:
"
Advisory: misc. bugs
Programname: proftpd
Versions: 1.2.0 <= pre10
Vendor: proftpd.net
Severity: high (root shell) and low
Contact: [EMAIL PROTECTED]
Bug1:
void set_proc_title(char *fmt,...) in src/main.c
<snip>
setproctitle, defined setproctitle(char *fmt,...);, calls vsnprintf().
This makes it vulnerable for formatattacks. By carefully outlining the
attackbuffer it's possible to gain root priviledges.
"
Even Cobalt supply patches, they just haven't installed them on their own
network yet.
Gossi.
_______________________________________________
cobalt-security mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-security