Mailinglist Archive: opensuse-security (343 mails)

< Previous Next >
Re: [suse-security] buffer overflow in telnetd
  • From: Marco Ahrendt <marco.ahrendt@xxxxxxxxxxx>
  • Date: Wed, 25 Jul 2001 09:00:42 +0200
  • Message-id: <20010725090041.B16821@xxxxxxxxxxx>
On Wed, Jul 25, 2001 at 08:46:49AM +0200, Markus Gaugusch wrote:
> > is any SuSE distribution (maybe older than 6.4?) affected by the
> > vulnerability above? the cert advisory was released some days ago
> Nobody should be running telnetd today, this can't be said often enough
> ... (sadly, it has to :(
> There are even free windows clients (teraterm pro, putty, ...), and you
> should also shut down ftp (and use scp/sftp instead).
> Also POP3 should be turned off for users with shell accounts. Better use
> POP3 over SSL (outlook can do this, netscape unfortunately not) or APOP
> (pegasus can do this AFAIR)
> of course, fetchmal can do both :)

of course you're right but this doesn't answers my question ;)

regards,
Marco

--
adconsys AG phone : +49-341-98-474-0
Karl-Liebknecht-Str. 19 fax : +49-341-98-474-59
04107 Leipzig/Germany url : http://www.adconsys.de/
gpg key: mail -s "get gpg key" marco.ahrendt@xxxxxxxxxxx

< Previous Next >