Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Jul 2001 15:05:29 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        jianzhong ren <jian@linuxmail.org>
Cc:        kris@obsecurity.org, FreeBSD Security <freebsd-security@FreeBSD.ORG>
Subject:   Re: some new exploit is out
Message-ID:  <20010726150529.A82158@xor.obsecurity.org>
In-Reply-To: <20010726220033.19129.qmail@linuxmail.org>; from jian@linuxmail.org on Fri, Jul 27, 2001 at 06:00:33AM %2B0800
References:  <20010726220033.19129.qmail@linuxmail.org>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Fri, Jul 27, 2001 at 06:00:33AM +0800, jianzhong ren wrote:
> 
> -----Original Message-----
> From: Kris Kennaway &lt;kris@obsecurity.org&gt;
> Date: Thu, 26 Jul 2001 14:52:58 -0700
> To: jianzhong ren &lt;jian@linuxmail.org&gt;
> Subject: Re: some new exploit is out
> 
> 
> &gt; On Fri, Jul 27, 2001 at 05:46:41AM +0800, jianzhong ren wrote:
> &gt; 
> &gt; &gt; i know that pacth for telnet is out too, but is there any new patch
> &gt; &gt; for shared signals vulnerability
> &gt; 
> &gt; Yes, a while ago.  You do read advisories, right?
> &gt; 
> &gt; &gt; adn portbinding shellcode?
> &gt; 
> &gt; What's this one?
> &gt; 
> &gt; Kris
> 
> and this http://www.hack.co.za/download.php?sid=1445 for setreuid(0,0) execve /bin/sh shellcode(29 bytes)
> &gt; 

Oh, I see..you're talking about examples of shellcode, not FreeBSD
vulnerabilities.  That has little to no relevance to anyone on this
list unless you're a script kiddie.

Kris

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE7YJQoWry0BWjoQKURApFRAKCRm8WL2Sm9gfQqWufMAdK7SRLXqwCgkDk6
MdarP6lAiuUX0rVY2IiIIC0=
=XI9a
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010726150529.A82158>