On Wed, Jul 25, 2001 at 08:46:49AM +0200, Markus Gaugusch wrote:
is any SuSE distribution (maybe older than 6.4?) affected by the vulnerability above? the cert advisory was released some days ago Nobody should be running telnetd today, this can't be said often enough ... (sadly, it has to :( There are even free windows clients (teraterm pro, putty, ...), and you should also shut down ftp (and use scp/sftp instead). Also POP3 should be turned off for users with shell accounts. Better use POP3 over SSL (outlook can do this, netscape unfortunately not) or APOP (pegasus can do this AFAIR) of course, fetchmal can do both :)
of course you're right but this doesn't answers my question ;) regards, Marco -- adconsys AG phone : +49-341-98-474-0 Karl-Liebknecht-Str. 19 fax : +49-341-98-474-59 04107 Leipzig/Germany url : http://www.adconsys.de/ gpg key: mail -s "get gpg key" marco.ahrendt@adconsys.de