From owner-freebsd-security Thu Jul 15 14:55:47 1999 Delivered-To: freebsd-security@freebsd.org Received: from lariat.lariat.org (lariat.lariat.org [206.100.185.2]) by hub.freebsd.org (Postfix) with ESMTP id CDE7B15013 for ; Thu, 15 Jul 1999 14:55:43 -0700 (PDT) (envelope-from brett@lariat.org) Received: from mustang.lariat.org (IDENT:ppp0.lariat.org@lariat.lariat.org [206.100.185.2]) by lariat.lariat.org (8.9.3/8.9.3) with ESMTP id PAA11213; Thu, 15 Jul 1999 15:53:07 -0600 (MDT) Message-Id: <4.2.0.58.19990715154344.00cc5db0@localhost> X-Sender: brett@localhost X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 Date: Thu, 15 Jul 1999 15:46:43 -0600 To: Bill Swingle , Paulo Fragoso From: Brett Glass Subject: Re: FreeBSD exploit? Cc: freebsd-security@FreeBSD.ORG In-Reply-To: <19990715142724.A23752@dub.net> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org At 02:27 PM 7/15/99 -0700, Bill Swingle wrote: >Before starting the hype-engine please use the correct term. It is a >_Denial of Service_ attack, not an exploit. The term "exploit" is a broad one; it covers both denial of service attacks and attacks that grant supervisor privileges to a local or remote user. >No one is going to get root >with this program. Actually, under Linux, they might. I understand that in some versions of Red Hat, forcing a reboot at the wrong moment during installation leaves the system open to a remote takeover. --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message