version 1.29, 1998/02/24 00:53:56 |
version 1.30, 1998/02/24 00:57:55 |
|
|
the problems were in fact exploitable. In other cases we have been |
the problems were in fact exploitable. In other cases we have been |
saved from full exploitability of complex step-by-step attacks because |
saved from full exploitability of complex step-by-step attacks because |
we had fixed one of the steps. An example of where we did this is the |
we had fixed one of the steps. An example of where we did this is the |
<a href=www.secnet.com/sni-advisories/sni-19.bsd.lpd.advisory.html> |
<a href=http://www.secnet.com/sni-advisories/sni-19.bsd.lpd.advisory.html> |
lpd advisory from |
lpd advisory from |
Secure Networks.</a><p> |
Secure Networks.</a><p> |
|
|