Date: Sun, 08 Nov 1998 14:21:16 -0700 From: Warner Losh <imp@village.org> To: Security <security@tasam.com> Cc: freebsd-security@FreeBSD.ORG Subject: Re: port 1080 scans Message-ID: <199811082121.OAA20841@harmony.village.org> In-Reply-To: Your message of "Sun, 08 Nov 1998 15:10:58 EST." <Pine.BSF.3.96.981108150950.14310A-100000@tasam.com> References: <Pine.BSF.3.96.981108150950.14310A-100000@tasam.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.BSF.3.96.981108150950.14310A-100000@tasam.com> Security writes: : I've noticed our socks5 dumping core quite often. It's stopped now, but : about a week ago it was acting up. The socks folks fixed a security hole (usual buffer overrun) in socks5 1.0r5 or so. I'd upgrade to the latest socks if you haven't already. The latest FreeBSD port of socks5 has this fix in it. The core dumps may indicate that you are under attack and the attacker are Script |<ids that don't know you aren't running Linux. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199811082121.OAA20841>