[] COMPAQ SSRT0745U -- telnetd potential option handling secur ity issue

From: Boren, Rich \(SSRT\) <"Boren,>
Date: Thu, 26 Jul 2001 19:59:11 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________
SOURCE: Compaq Computer Corporation
        Compaq Services
        Software Security Response Team USA

Compaq case id SSRT0745U

ref: potential telnetd option handling vulnerability

x-ref: TESO Security Advisory 06/2001
       CERT CA2001-21 Advisory 07/2001


 Compaq has evaluated this vulnerability to telnetd
 distributed for Compaq Tru64/UNIX and OpenVMS Operating
 Systems Software and has determined that telnetd is not
 vulnerable to unauthorized command execution or
 root compromise.

 Compaq appreciates your cooperation and patience.
 We regret any inconvenience applying this information
 may cause.

 As always, Compaq urges you to periodically review your system
 management and security procedures. Compaq will continue to
 review and enhance the security features of its products and work
 with customers to maintain and improve the security and integrity
 of their systems.

 To subscribe to automatically receive future NEW Security
 Advisories from the Compaq's Software Security Response Team
 via electronic mail,

 Use your browser select the URL
  http://www.support.compaq.com/patches/mailing-list.shtml
  Select "Security and Individual Notices" for immediate dispatch
  notifications directly to your mailbox.

  To report new Security Vulnerabilities, send mail to:
     security-ssrt_at_compaq.com

(c) Copyright 2001 Compaq Computer Corporation. All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.1

iQA/AwUBO2C5JjnTu2ckvbFuEQKmqwCg/m87d9k22+qV5GY2vJAR409KFD4AoIbR
vsQaZ9DOI4D4sj5Feg4bRZmS
=F5Nq
-----END PGP SIGNATURE-----
Received on Fri Jul 27 2001 - 01:00:35 NZST

This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:42 NZDT