From owner-freebsd-security Thu Jul 26 15:34:14 2001 Delivered-To: freebsd-security@freebsd.org Received: from mg.hk5.outblaze.com (202-123-209-152.outblaze.com [202.123.209.152]) by hub.freebsd.org (Postfix) with ESMTP id 67A1F37B403 for ; Thu, 26 Jul 2001 15:33:59 -0700 (PDT) (envelope-from jian@linuxmail.org) Received: from ws4.us.outblaze.com (ws4.us.outblaze.com [209.249.164.192]) by mg.hk5.outblaze.com (8.11.2/8.11.2) with SMTP id f6QMXvU30870 for ; Thu, 26 Jul 2001 22:33:57 GMT Received: (qmail 21908 invoked by uid 1001); 26 Jul 2001 22:33:56 -0000 Message-ID: <20010726223356.21906.qmail@linuxmail.org> Content-Type: text/plain; charset="iso-8859-1" Content-Disposition: inline Content-Transfer-Encoding: 7bit Mime-Version: 1.0 X-Mailer: MIME-tools 4.104 (Entity 4.117) Received: from ws4.us.outblaze.com for [210.237.173.114] via web-mailer on Fri, 27 Jul 2001 06:33:56 +0800 From: "jianzhong ren" To: kris@obsecurity.org Cc: FreeBSD Security Date: Fri, 27 Jul 2001 06:33:56 +0800 Subject: Re: some new exploit is out Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org > On Fri, Jul 27, 2001 at 06:00:33AM +0800, jianzhong ren wrote: > > > > -----Original Message----- > > From: Kris Kennaway <kris@obsecurity.org> > > Date: Thu, 26 Jul 2001 14:52:58 -0700 > > To: jianzhong ren <jian@linuxmail.org> > > Subject: Re: some new exploit is out > > > > > > > On Fri, Jul 27, 2001 at 05:46:41AM +0800, jianzhong ren wrote: > > > > > > > i know that pacth for telnet is out too, but is there any new patch > > > > for shared signals vulnerability > > > > > > Yes, a while ago. You do read advisories, right? > > > > > > > adn portbinding shellcode? > > > > > > What's this one? > > > > > > Kris > > > > and this <A HREF="http://www.hack.co.za/download.php?sid=1445" TARGET="_new"><FONT COLOR="BLUE">http://www.hack.co.za/download.php?sid=1445</FONT></A> for setreuid(0,0) execve /bin/sh shellcode(29 bytes) > > > > > Oh, I see..you're talking about examples of shellcode, not FreeBSD > vulnerabilities. That has little to no relevance to anyone on this > list unless you're a script kiddie. > i'm not a script kiddie but may be some of my user. the company where i work offer shell server in freebsd, and i want to prepare my shelll server for any kind exploit. thank you -- Get your free email from www.linuxmail.org Powered by Outblaze To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message