From owner-freebsd-security Mon May 24 8:51:32 1999 Delivered-To: freebsd-security@freebsd.org Received: from gatekeeper.iserver.com (gatekeeper.iserver.com [192.41.0.2]) by hub.freebsd.org (Postfix) with ESMTP id 7F95C14C8C for ; Mon, 24 May 1999 08:51:31 -0700 (PDT) (envelope-from hart@iserver.com) Received: by gatekeeper.iserver.com; Mon, 24 May 1999 09:51:30 -0600 (MDT) Received: from unknown(192.168.1.109) by gatekeeper.iserver.com via smap (V3.1.1) id xma007157; Mon, 24 May 99 09:51:03 -0600 Received: (hart@localhost) by anchovy.orem.iserver.com (8.9.2) id JAA10648; Mon, 24 May 1999 09:50:27 -0600 (MDT) Date: Mon, 24 May 1999 09:50:27 -0600 (MDT) From: Paul Hart X-Sender: hart@anchovy.orem.iserver.com To: Dag-Erling Smorgrav Cc: freebsd-security@FreeBSD.ORG Subject: Re: Server trying to connect to Port 113 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On 24 May 1999, Dag-Erling Smorgrav wrote: > I don't know of any way to gain access to a machine through NetBIOS > services; What about the remote root overflow exploit for Samba a while back? Paul Hart -- Paul Robert Hart ><8> ><8> ><8> Verio Web Hosting, Inc. hart@iserver.com ><8> ><8> ><8> http://www.iserver.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message