Thank God, someone else on this mailing list that understands what's going on.
You have my praise!

On Wed, Oct 04, 2000 at 10:09:21PM -0400, Kurth Bemis wrote:
> At 10:01 PM 10/4/2000 -0400, Kenneth E. Lussier wrote:
> 
> ah!  i see the error in your ways.....(i think) :-)
> 
> did you search for openBSD?  if so on a lot of postings they say - this 
> problem was fixed in openbsd 6 months ago...that could make them show up in 
> a search.....
> 
> look at this
> 
> http://www.openbsd.org/security.html#27
> 
> thats all the security listing for ver 2.7.  a lot of things on that list 
> aren't installed by default....i'm not quite sure what they mean by 
> default.....you can DL and install the bare minimum and it totals ~50 megs.....
> 
> anyways look at this too..
> 
> http://www.openbsd.org/errata.html
> 
> hope that this helps...
> 
> ~kurth
> 
> >I have a simple question. Several people today have mentioned that
> >OpenBSD is more secure. I won't get into that. But, several people made
> >the claim that there hasn't been a single remote exploit in OpenBSD in
> >over three years. I've heard this claim a lot out of the OpenBSD folks.
> 
> with the default install - a lot of what you listed below is add on 
> software.....lets look at it...
> 
> >So, I was parusing Security Foucus, and I decided to do a little search
> >for OpenBSD. Below are the results of that search. Three quarters of
> >these are remote (and I'm not counting DoS). Am I missing something, or
> >are the OpenBSD folks just not looking??
> >
> >Kenny
> >
> >
> >   2000-10-04: Multiple Vendor BSD libutil pw_error() Format String
> >Vulnerability
> >   2000-10-04: Multiple Vendor BSD fstat Format String Vulnerability
> >   2000-09-30: scp File Create/Overwrite Vulnerability
> >   2000-09-26: Multiple Vendor lpr Format String Vulnerability
> >   2000-09-17: OpenBSD "empty" AH/ESP Packet Remote Denial of Service
> >Vulnerability
> >   2000-08-25: Multiple Vendor mgetty Symbolic Link Traversal
> >Vulnerability
> >   2000-08-17: X-Chat Command Execution Via URLs Vulnerability
> >   2000-08-15: xlockmore User Supplied Format String Vulnerability
> >   2000-08-08: Multiple Vendor mopd User Inputted Data Used as Format
> >String Vulnerability
> >   2000-08-08: Multiple Vendor mopd Buffer Overflow Vulnerability
> >   2000-07-11: BB4 Technologies Big Brother Directory Traversal
> >Vulnerability
> >   2000-07-09: LPRng Incorrect Installation Permissions Vulnerability
> >   2000-07-05: Multiple Vendor ftpd setproctitle() Format String
> >Vulnerability
> >   2000-06-11: BB4 Big Brother CGI File Creation Vulnerability
> >   2000-06-08: OpenSSH UseLogin Vulnerability
> >   2000-06-01: Multiple Vendor *BSD Denial of Service Vulnerability
> >   2000-05-29: Xlockmore 4.16 Buffer Overflow Vulnerability
> >   2000-05-29: Multiple Vendor BSD Semaphore IPC Denial Of Service
> >Vulnerability
> >   2000-05-10: Matt Wright FormMail Environmental Variables Disclosure
> >Vulnerability
> >   2000-02-24: SSH client xauth Vulnerability
> >   2000-01-21: Multiple Vendor BSD /proc File Sytem Vulnerability
> >   2000-01-19: Multiple Vendor BSD make /tmp Race Condition Vulnerability
> >   1999-09-05: Multiple Vendor setsockopt() Denial of Service
> >Vulnerability
> >   1999-08-09: Multiple Vendor profil(2) Vulnerability
> >   1999-07-02: BSD UFS Secure Level 1 Vulnerability
> >   1999-02-17: Multiple Vendor Lsof Buffer Overflow Vulnerability
> >   1998-12-21: Multiple Vendor TCP/IP Implementations Vulnerability
> >   1998-04-21: Multiple Vendor BNU uucpd Buffer Overflow Vulnerability
> >   1997-09-01: Multiple Vendor vacation(1) Vulnerability
> >
> >**********************************************************
> >To unsubscribe from this list, send mail to
> >[EMAIL PROTECTED] with the following text in the
> >*body* (*not* the subject line) of the letter:
> >unsubscribe gnhlug
> >**********************************************************
> 
> Kurth Bemis - Network/Systems Administrator, USAExpress.net/Ozone Computer
> 
> [EMAIL PROTECTED]
> http://www.usaexpress.net/kurth
> ICQ - 6624050
> Call Sign - N1TYW
> PGP key available - http://www.usaexpress.net/kurth/pgp
> 
> Fight Weak Encryption!  Donate your wasted CPU cycles to Distributed.net 
> (http://www.distributed.net)
> 
> 
> 
> **********************************************************
> To unsubscribe from this list, send mail to
> [EMAIL PROTECTED] with the following text in the
> *body* (*not* the subject line) of the letter:
> unsubscribe gnhlug
> **********************************************************

-- 
Tony Lambiris [[EMAIL PROTECTED]]
OpenBSD: Because I care. [www.openbsd.org]

**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to