Ted Roby <[EMAIL PROTECTED]> writes: > Does this vulnerability require a login? Is a system safe if it does not > allow root login, and password logins?
Nobody knows the answer at the moment. There isn't any obvious way to exploit the overflow (mind that the attacker cannot write arbitrary data, just a couple of zeros), and I still doubt if it is exploitable at all. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]