Ted Roby <[EMAIL PROTECTED]> writes:

> Does this vulnerability require a login? Is a system safe if it does not
> allow root login, and password logins?

Nobody knows the answer at the moment.  There isn't any obvious way to
exploit the overflow (mind that the attacker cannot write arbitrary
data, just a couple of zeros), and I still doubt if it is exploitable
at all.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to