Skip site navigation (1)Skip section navigation (2)
Date:      04 May 1999 23:22:44 +0200
From:      Dag-Erling Smorgrav <des@ifi.uio.no>
To:        security@freebsd.org
Subject:   [Jamie Rishaw <jamie@exodus.net>] FreeBSD 3.1 remote reboot exploit
Message-ID:  <xzpwvyottqz.fsf@hrotti.ifi.uio.no>

next in thread | raw e-mail | index | archive | help
------- Start of forwarded message -------
Message-ID:  <19990501031840.A24252@dilbert.exodus.net>
Date:         Sat, 1 May 1999 03:18:40 -0500
Reply-To: jamie@exodus.net
From: Jamie Rishaw <jamie@exodus.net>
Subject:      FreeBSD 3.1 remote reboot exploit
To: BUGTRAQ@NETSPACE.ORG

Hi,

  Sorry to be so vague, but I wanted to let everyone know,

  It's been demonstrated to me by two people who will not reveal "how"
that there is a remote bug exploit, almost certainly over IP, that will
cause FreeBSD-3.1 systems to reboot with no warnings.

  The second box this was demonstrated on today had no open services
besides ircd, and was remote rebooted.  (The first box had open services
such as smtp, ssh, pop, http, but did /not/ run ircd, eliminating ircd
as the culprit).

  If anyone can shed some light on this (really bad) issue, it'd be
greatly appreciated, especially since I am(was) in the process of
upgrading all of my boxes to 3.1. (3.1-REL).

  Regards,

-jamie
--
jamie rishaw (efnet:gavroche) -- Exodus Communications, Inc.
>Sr. Network Engr, Chicago, SoCal Data Centers
<jimmie> In an interesting move Exodus Communications annouced today that
         they have replaced all of their backbone engineers with furby's

------- End of forwarded message -------


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpwvyottqz.fsf>