Date: 04 May 1999 23:22:44 +0200 From: Dag-Erling Smorgrav <des@ifi.uio.no> To: security@freebsd.org Subject: [Jamie Rishaw <jamie@exodus.net>] FreeBSD 3.1 remote reboot exploit Message-ID: <xzpwvyottqz.fsf@hrotti.ifi.uio.no>
next in thread | raw e-mail | index | archive | help
------- Start of forwarded message ------- Message-ID: <19990501031840.A24252@dilbert.exodus.net> Date: Sat, 1 May 1999 03:18:40 -0500 Reply-To: jamie@exodus.net From: Jamie Rishaw <jamie@exodus.net> Subject: FreeBSD 3.1 remote reboot exploit To: BUGTRAQ@NETSPACE.ORG Hi, Sorry to be so vague, but I wanted to let everyone know, It's been demonstrated to me by two people who will not reveal "how" that there is a remote bug exploit, almost certainly over IP, that will cause FreeBSD-3.1 systems to reboot with no warnings. The second box this was demonstrated on today had no open services besides ircd, and was remote rebooted. (The first box had open services such as smtp, ssh, pop, http, but did /not/ run ircd, eliminating ircd as the culprit). If anyone can shed some light on this (really bad) issue, it'd be greatly appreciated, especially since I am(was) in the process of upgrading all of my boxes to 3.1. (3.1-REL). Regards, -jamie -- jamie rishaw (efnet:gavroche) -- Exodus Communications, Inc. >Sr. Network Engr, Chicago, SoCal Data Centers <jimmie> In an interesting move Exodus Communications annouced today that they have replaced all of their backbone engineers with furby's ------- End of forwarded message ------- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpwvyottqz.fsf>