Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 17 Jul 1999 14:11:32 +0200
From:      Sheldon Hearn <sheldonh@uunet.co.za>
To:        Paulo Fragoso <paulo@nlink.com.br>
Cc:        Matthew Dillon <dillon@apollo.backplane.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: FreeBSD exploit? 
Message-ID:  <92620.932213492@axl.noc.iafrica.com>
In-Reply-To: Your message of "Sat, 17 Jul 1999 08:55:28 -0300." <Pine.BSF.3.96.990717084540.29894B-100000@mirage.nlink.com.br> 

next in thread | previous in thread | raw e-mail | index | archive | help


On Sat, 17 Jul 1999 08:55:28 -0300, Paulo Fragoso wrote:

> I thought it was more dangerous, because the article is classified
> "remote", and someone can remotely use to afsect another system.

I think that's a mistake. Since the exploit "allows any user to bypass
rlimits", a login is implied. Also, the code provided must be run on the
host in question.

Ciao,
Sheldon.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?92620.932213492>