Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 15 Jul 1999 15:46:43 -0600
From:      Brett Glass <brett@lariat.org>
To:        Bill Swingle <unfurl@dub.net>, Paulo Fragoso <paulo@nlink.com.br>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: FreeBSD exploit?
Message-ID:  <4.2.0.58.19990715154344.00cc5db0@localhost>
In-Reply-To: <19990715142724.A23752@dub.net>
References:  <Pine.BSF.3.96.990715181051.8607A-100000@mirage.nlink.com.br> <Pine.BSF.3.96.990715181051.8607A-100000@mirage.nlink.com.br>

next in thread | previous in thread | raw e-mail | index | archive | help
At 02:27 PM 7/15/99 -0700, Bill Swingle wrote:

 >Before starting the hype-engine please use the correct term. It is a
>_Denial of Service_ attack, not an exploit. 

The term "exploit" is a broad one; it covers both denial of service attacks 
and attacks that grant supervisor privileges to a local or remote user.

>No one is going to get root
>with this program.

Actually, under Linux, they might. I understand that in some versions of 
Red Hat, forcing a reboot at the wrong moment during installation leaves
the system open to a remote takeover.

--Brett



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.0.58.19990715154344.00cc5db0>