[16575] in bugtraq

home help back first fref pref prev next nref lref last post

Re: screen 3.9.5 root vulnerability

daemon@ATHENA.MIT.EDU (Andreas Hasenack)
Tue Sep 5 12:46:23 2000

Mail-Followup-To: Andreas Hasenack <andreas@conectiva.com.br>,
                  BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
              protocol="application/pgp-signature"; boundary="BXVAT5kNtrzKuDFl"
Content-Disposition: inline
Message-ID:  <20000905091310.C16082@conectiva.com.br>
Date:         Tue, 5 Sep 2000 09:13:10 -0300
Reply-To: Andreas Hasenack <andreas@CONECTIVA.COM.BR>
From: Andreas Hasenack <andreas@CONECTIVA.COM.BR>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.10.10009050126090.10855-100000@shell.solutions.fi>;
              from jouko@SOLUTIONS.FI on Tue, Sep 05, 2000 at 01:28:01AM +0300

--BXVAT5kNtrzKuDFl
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Em Tue, Sep 05, 2000 at 01:28:01AM +0300, Jouko Pynn=F6nen escreveu:
> NOT VULNERABLE
>=20
> Red Hat Linux 6.0 and later, most other Linux distributions

Conectiva Linux does not ship screen SUID and is therefore not vulnerable.


--=20
Andreas Hasenack
andreas@conectiva.com.br
BIG Linux user!


--BXVAT5kNtrzKuDFl
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.2 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5tONWeEJZs/PdwpARAsvKAJ41ISvb36L0noEVrH3j4m1sgpm8igCghWeS
WxA59LAdBATu4GOEg+Tq/eg=
=zGB2
-----END PGP SIGNATURE-----

--BXVAT5kNtrzKuDFl--

home help back first fref pref prev next nref lref last post