I'm of the opinion that this isn't a valiant method of publicizing an "exploit", but care more about the end than the means.
This appears to be fixed in HEAD, or at least, I can't immediately reproduce it out of the tree. I'll bisect it tomorrow. Eric On Mon, Jun 23, 2008 at 11:12 AM, rembrandt <[EMAIL PROTECTED]> wrote: > As posted to the OpenBSD Mailinglist this is a problem is propably more > related to you directly. > > I made an update to the following Advisory after people in the CERTS (I > wont mention any here..) because a lot claimed it's a fake/myth. > > > http://marc.info/?l=openbsd-ports&m=121422445904683&w=2 > > Or directly: > > http://www.milw0rm.com/exploits/4028 > > Î mentioned OpenBSD because I just (personaly) tested it there and got > told that it might not always work. Maybe you like to investigate this > further. > I just took OpenBSD as example for the guys at the CERTs. > > I found no security contact either and did not wanted to spam the > mailinglist. > > > Kind regards, > Rembrandt > > > >