From owner-freebsd-security Mon Jul 28 16:18:49 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id QAA11211 for security-outgoing; Mon, 28 Jul 1997 16:18:49 -0700 (PDT) Received: from mail.MCESTATE.COM (vince@mail.MCESTATE.COM [207.211.200.50]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id QAA11197 for ; Mon, 28 Jul 1997 16:18:39 -0700 (PDT) Received: from localhost (vince@localhost) by mail.MCESTATE.COM (8.8.5/8.8.5) with SMTP id QAA06857; Mon, 28 Jul 1997 16:18:31 -0700 (PDT) Date: Mon, 28 Jul 1997 16:18:31 -0700 (PDT) From: Vincent Poy To: Ollivier Robert cc: security@FreeBSD.ORG, JbHunt , "[Mario1-]" Subject: Re: security hole in FreeBSD In-Reply-To: <19970728230758.23621@keltia.freenix.fr> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Mon, 28 Jul 1997, Ollivier Robert wrote: =)According to Vincent Poy: =)> Nope, when I added perl5 yesterday from the ports tree, I deleted =)> the perl5.003 and sperl5.003 that was there after it got updated to =)> perl5.00401 and sperl5.00401. Is the /usr/bin/perl vulnerable in any way? =) =)Not if it is CURRENT from later than May. No hole that we know of anyway. The CURRENT is from June 10th, 1997. =)> True but netstat wasn't working anymore after we kicked him off =)> the first time and rejected all packets from his ip # when he came back =)> on. =) =)LSOF is your friend in case you haven't compiled it yet. Only if I can get on the machine, it won't even boot in single user mode now. /bin/csh and /bin/sh has been deleted. Cheers, Vince - vince@MCESTATE.COM - vince@GAIANET.NET ________ __ ____ Unix Networking Operations - FreeBSD-Real Unix for Free / / / / | / |[__ ] GaiaNet Corporation - M & C Estate / / / / | / | __] ] Beverly Hills, California USA 90210 / / / / / |/ / | __] ] HongKong Stars/Gravis UltraSound Mailing Lists Admin /_/_/_/_/|___/|_|[____]