Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 Jul 2001 13:47:43 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        security@FreeBSD.ORG
Subject:   Re: [PATCH] Re: FreeBSD remote root exploit ?
Message-ID:  <5.1.0.14.0.20010719134655.0397a720@marble.sentex.ca>
In-Reply-To: <3B571D75.A8E8AB58@oksala.org>
References:  <20010719123906.D71473-100000@awww.jeah.net> <005d01c1107a$b6f57a40$0d00a8c0@alexus>

next in thread | previous in thread | raw e-mail | index | archive | help
At 01:48 PM 7/19/01 -0400, Pierre-Luc Lesp=E9rance wrote:
>alexus wrote:
> >
> > su-2.05# cd /usr/src/libexec/telnetd/
> > su-2.05# make all install
> > install -c -s -o root -g wheel -m 555   telnetd /usr/libexec
> > install -c -o root -g wheel -m 444 telnetd.8.gz  /usr/share/man/man8
> > su-2.05#
> >
> > hmm that's it? seems like too short compilation .. is it supposed to be=
=20
> like
> > this?
>make clean
>make depend
>make
>make install


And,
kill -HUP `cat /var/run/inetd.pid`

         ---Mike



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20010719134655.0397a720>