Date: Thu, 26 Jul 2001 15:05:29 -0700 From: Kris Kennaway <kris@obsecurity.org> To: jianzhong ren <jian@linuxmail.org> Cc: kris@obsecurity.org, FreeBSD Security <freebsd-security@FreeBSD.ORG> Subject: Re: some new exploit is out Message-ID: <20010726150529.A82158@xor.obsecurity.org> In-Reply-To: <20010726220033.19129.qmail@linuxmail.org>; from jian@linuxmail.org on Fri, Jul 27, 2001 at 06:00:33AM %2B0800 References: <20010726220033.19129.qmail@linuxmail.org>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Fri, Jul 27, 2001 at 06:00:33AM +0800, jianzhong ren wrote: > > -----Original Message----- > From: Kris Kennaway <kris@obsecurity.org> > Date: Thu, 26 Jul 2001 14:52:58 -0700 > To: jianzhong ren <jian@linuxmail.org> > Subject: Re: some new exploit is out > > > > On Fri, Jul 27, 2001 at 05:46:41AM +0800, jianzhong ren wrote: > > > > > i know that pacth for telnet is out too, but is there any new patch > > > for shared signals vulnerability > > > > Yes, a while ago. You do read advisories, right? > > > > > adn portbinding shellcode? > > > > What's this one? > > > > Kris > > and this http://www.hack.co.za/download.php?sid=1445 for setreuid(0,0) execve /bin/sh shellcode(29 bytes) > > Oh, I see..you're talking about examples of shellcode, not FreeBSD vulnerabilities. That has little to no relevance to anyone on this list unless you're a script kiddie. Kris [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7YJQoWry0BWjoQKURApFRAKCRm8WL2Sm9gfQqWufMAdK7SRLXqwCgkDk6 MdarP6lAiuUX0rVY2IiIIC0= =XI9a -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010726150529.A82158>
