Date: Mon, 6 Jan 1997 02:53:05 +0100 (MET) From: Maikel Verheijen <maikel@escape.stack.nl> To: moke@fools.ecpnet.com (Jimbo Bahooli) Cc: freebsd-security@freebsd.org Subject: Re: sendmail....tricks... Message-ID: <199701060153.CAA09010@escape.stack.nl> In-Reply-To: <Pine.BSF.3.95.970105182549.18011A-100000@fools.ecpnet.com> from "Jimbo Bahooli" at Jan 5, 97 06:47:29 pm
next in thread | previous in thread | raw e-mail | index | archive | help
Quoting "Jimbo Bahooli": <!> Any comments on this? Time permitting I am going to explore running <!> sendmail on a non-root port and having netcat forward connections to it <!> from inetd. What if people start connecting to the real sendmail??? If there are vulnerabilities in sendmail, they can still read the mails of all users on the system (If the attacker has an account) <!> <!> -moke@fools.ecpnet.com <!> Greetings, Maikel Verheijen
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199701060153.CAA09010>