Bugtraq mailing list archives
RE: multiple vendor telnet daemon vulnerability
From: Paul Rogers <paul.rogers () mis-cds com>
Date: Wed, 25 Jul 2001 17:35:36 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Quick question, does this bear in relation to the Microsoft Security Bulletin MS01-039 regarding a "memory leak" within the Telnet service? Just a thought. Cheers, Paul Rogers, Network Security Analyst. MIS Corporate Defence Solutions Limited Tel: +44 (0)1622 723422 (Direct Line) +44 (0)1622 723400 (Switchboard) Fax: +44 (0)1622 728580 Website: http://www.mis-cds.com/
-----Original Message----- From: Sebastian [mailto:scut () nb in-berlin de] Sent: 18 July 2001 21:15 To: bugtraq () securityfocus com Subject: multiple vendor telnet daemon vulnerability
** Message snipped ** -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.3 iQA/AwUBO173D7nKcoQ5QY/3EQLSWgCgyOhbm2UIGA+1/80bEnK2xBO/sngAoIdd Yr675HC3oIudL5ocPA58GCNY =lmua -----END PGP SIGNATURE-----
Current thread:
- multiple vendor telnet daemon vulnerability Sebastian (Jul 18)
- Re: multiple vendor telnet daemon vulnerability Steffen Kluge (Jul 24)
- Re: multiple vendor telnet daemon vulnerability Kris Kennaway (Jul 24)
- Re: multiple vendor telnet daemon vulnerability Kris Kennaway (Jul 24)
- Re: multiple vendor telnet daemon vulnerability Chad Loder (Jul 25)
- Re: multiple vendor telnet daemon vulnerability Kris Kennaway (Jul 24)
- Re: multiple vendor telnet daemon vulnerability Steffen Kluge (Jul 24)
- <Possible follow-ups>
- RE: multiple vendor telnet daemon vulnerability Paul Rogers (Jul 25)