Date: Thu, 19 Jul 2001 13:47:43 -0400 From: Mike Tancsa <mike@sentex.net> To: security@FreeBSD.ORG Subject: Re: [PATCH] Re: FreeBSD remote root exploit ? Message-ID: <5.1.0.14.0.20010719134655.0397a720@marble.sentex.ca> In-Reply-To: <3B571D75.A8E8AB58@oksala.org> References: <20010719123906.D71473-100000@awww.jeah.net> <005d01c1107a$b6f57a40$0d00a8c0@alexus>
next in thread | previous in thread | raw e-mail | index | archive | help
At 01:48 PM 7/19/01 -0400, Pierre-Luc Lesp=E9rance wrote: >alexus wrote: > > > > su-2.05# cd /usr/src/libexec/telnetd/ > > su-2.05# make all install > > install -c -s -o root -g wheel -m 555 telnetd /usr/libexec > > install -c -o root -g wheel -m 444 telnetd.8.gz /usr/share/man/man8 > > su-2.05# > > > > hmm that's it? seems like too short compilation .. is it supposed to be= =20 > like > > this? >make clean >make depend >make >make install And, kill -HUP `cat /var/run/inetd.pid` ---Mike To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20010719134655.0397a720>