Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 4 May 1999 11:24:32 -0700 (PDT)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        "Raymond Wiker" <raymond@orion.no>
Cc:        <freebsd-stable@FreeBSD.ORG>, <security@FreeBSD.ORG>
Subject:   Re: FreeBSD 3.1 remote reboot exploit (fwd)
Message-ID:  <199905041824.LAA14835@apollo.backplane.com>
References:  <005401be9932$60574860$380051c2@greg.qmpgmc.ac.uk> <14126.49715.589157.172436@foobar.orion.no>

next in thread | previous in thread | raw e-mail | index | archive | help
:Greg Quinlan writes:
: > This sounds so.. so very familiar!!
: > 
: > I have been the target of exploits before......
: > 
: > The exact same thing I have been experiencing........but not for about 5
: > days now!
: > 
: > I'm not convinced its a pure exploit.. (i.e. a program specifically written
: > for the purpose)
:
:	My first post to freebsd-stable (and security) - and it's a
:me-too :-)
:
:	I'm running 3.1-RELEASE on a 486 with 16 MB of RAM, and this
:machine has been falling over regularly. Up until now I have suspected 
:the local electricity, but it had rebooted this morning, even though
:it's now on a UPS.
:
:	I have two other machines running 3.1-RELEASE in a slightly
:less hostile environment (i.e, no direct connections outwards), and
:they have been much more stable. I cannot rule out a hardware problem
:on the 486; I'll know for sure as soon as I upgrade it.
:
:	//Raymond.

    Setup a serial console and monitor it so you can see the panic message.

    Or, better, configure the kernel to drop into DDB when it panics so you
    can do a stack 'trace', and report the results.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199905041824.LAA14835>