Date: Thu, 15 Jul 1999 15:46:43 -0600 From: Brett Glass <brett@lariat.org> To: Bill Swingle <unfurl@dub.net>, Paulo Fragoso <paulo@nlink.com.br> Cc: freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD exploit? Message-ID: <4.2.0.58.19990715154344.00cc5db0@localhost> In-Reply-To: <19990715142724.A23752@dub.net> References: <Pine.BSF.3.96.990715181051.8607A-100000@mirage.nlink.com.br> <Pine.BSF.3.96.990715181051.8607A-100000@mirage.nlink.com.br>
next in thread | previous in thread | raw e-mail | index | archive | help
At 02:27 PM 7/15/99 -0700, Bill Swingle wrote: >Before starting the hype-engine please use the correct term. It is a >_Denial of Service_ attack, not an exploit. The term "exploit" is a broad one; it covers both denial of service attacks and attacks that grant supervisor privileges to a local or remote user. >No one is going to get root >with this program. Actually, under Linux, they might. I understand that in some versions of Red Hat, forcing a reboot at the wrong moment during installation leaves the system open to a remote takeover. --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.0.58.19990715154344.00cc5db0>