Remote Exploit Found in OpenBSD Kernel

Discussion in 'News and Article Comments' started by Impotence, Mar 15, 2007.

  1. Impotence

    Impotence May the source be with u!

    Likes Received:
    6
    Trophy Points:
    38
    "OpenBSD is known for its security policies, and for its boast of "only one remote exploit in over 10 years". Well, make that two, because Core Security has found a remotely expolitable buffer overflow in the OpenBSD kernel. Upgrade your firewalls as soon as possible."

    Source: Slashdot.org
    Article: Core Security | Home

    [OT]
    Thats 2 in 10 years! but this one isnt exactly critical, its allready been patched and the machine has to have a ipv6 address to be vulnerable!

    [/OT]
     
  2. Swansen

    Swansen The Ninj

    Likes Received:
    0
    Trophy Points:
    36
    this reminds me, i got an XP update a month or so ago, lol, the funny part is that it says rate in the update this fixes a problem with activeX that fixes an issue that always your computer to be taken over remotely......
     
  3. Addis

    Addis The King

    Likes Received:
    91
    Trophy Points:
    48
    Luckily ipv6 is nowhere near mainstream.
     
  4. Impotence

    Impotence May the source be with u!

    Likes Received:
    6
    Trophy Points:
    38
    dont be so comfortable with that statement Addis, all of my machines have ipv6 addresses on my local network, i never use them... but they all support ipv6, just there not ipv6 accessible from the internet! (just my local network :p)

    Im guessing openBSD is the same, hence why the /. article states you need local network access.
     
  5. Addis

    Addis The King

    Likes Received:
    91
    Trophy Points:
    48
    Hence I said its nowhere near mainstream. Does using ipv6 on a local internal network make it mainstream? IMO, if it weren't for NAT we'd have it by now.
     

Share This Page