Date: Sat, 17 Jul 1999 14:11:32 +0200 From: Sheldon Hearn <sheldonh@uunet.co.za> To: Paulo Fragoso <paulo@nlink.com.br> Cc: Matthew Dillon <dillon@apollo.backplane.com>, freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD exploit? Message-ID: <92620.932213492@axl.noc.iafrica.com> In-Reply-To: Your message of "Sat, 17 Jul 1999 08:55:28 -0300." <Pine.BSF.3.96.990717084540.29894B-100000@mirage.nlink.com.br>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 17 Jul 1999 08:55:28 -0300, Paulo Fragoso wrote: > I thought it was more dangerous, because the article is classified > "remote", and someone can remotely use to afsect another system. I think that's a mistake. Since the exploit "allows any user to bypass rlimits", a login is implied. Also, the code provided must be run on the host in question. Ciao, Sheldon. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?92620.932213492>