Date: Thu, 25 Jan 2001 11:46:33 -0600 From: "Scot W. Hetzel" <hetzels@westbend.net> To: <freebsd-security@FreeBSD.ORG> Subject: Re: buffer overflows in rpc.statd? Message-ID: <026c01c086f6$c2c151e0$7d7885c0@genroco.com> References: <200101251726.f0PHQei65827@troutmask.apl.washington.edu> <024b01c086f6$0cfda480$7d7885c0@genroco.com>
next in thread | previous in thread | raw e-mail | index | archive | help
From: "Scot W. Hetzel" <hetzels@westbend.net> > > Anybody have an Ideal as to what this is? > > Jan 25 03:27:48 spare rpc.statd: invalid hostname to sm_stat: > ^X\xf7\xff\xbf^X\xf7\xff\xbf^Y\xf7\xff\xbf^Y\xf7\xff\xbf^Z\xf7\xff\xbf^Z\xf7 > \x Thanks, Chris for letting us know it's a linux exploit. Is there anyway that we can find the IP address of the script kiddie using this exploit so we can inform their ISP. Thanks, Scot To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?026c01c086f6$c2c151e0$7d7885c0>