Bugtraq mailing list archives
RE: multiple vendor telnet daemon vulnerability
From: Paul Rogers <paul.rogers () mis-cds com>
Date: Wed, 25 Jul 2001 17:35:36 +0100
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Quick question, does this bear in relation to the Microsoft Security
Bulletin MS01-039 regarding a "memory leak" within the Telnet
service? Just a thought.
Cheers,
Paul Rogers,
Network Security Analyst.
MIS Corporate Defence Solutions Limited
Tel: +44 (0)1622 723422 (Direct Line)
+44 (0)1622 723400 (Switchboard)
Fax: +44 (0)1622 728580
Website: http://www.mis-cds.com/
-----Original Message----- From: Sebastian [mailto:scut () nb in-berlin de] Sent: 18 July 2001 21:15 To: bugtraq () securityfocus com Subject: multiple vendor telnet daemon vulnerability
** Message snipped ** -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.3 iQA/AwUBO173D7nKcoQ5QY/3EQLSWgCgyOhbm2UIGA+1/80bEnK2xBO/sngAoIdd Yr675HC3oIudL5ocPA58GCNY =lmua -----END PGP SIGNATURE-----
Current thread:
- multiple vendor telnet daemon vulnerability Sebastian (Jul 18)
- Re: multiple vendor telnet daemon vulnerability Steffen Kluge (Jul 24)
- Re: multiple vendor telnet daemon vulnerability Kris Kennaway (Jul 24)
- Re: multiple vendor telnet daemon vulnerability Kris Kennaway (Jul 24)
- Re: multiple vendor telnet daemon vulnerability Chad Loder (Jul 25)
- Re: multiple vendor telnet daemon vulnerability Kris Kennaway (Jul 24)
- Re: multiple vendor telnet daemon vulnerability Steffen Kluge (Jul 24)
- <Possible follow-ups>
- RE: multiple vendor telnet daemon vulnerability Paul Rogers (Jul 25)
