Date: Sun, 08 Nov 1998 14:21:16 -0700 From: Warner Losh <imp@village.org> To: Security <security@tasam.com> Cc: freebsd-security@FreeBSD.ORG Subject: Re: port 1080 scans Message-ID: <199811082121.OAA20841@harmony.village.org> In-Reply-To: Your message of "Sun, 08 Nov 1998 15:10:58 EST." <Pine.BSF.3.96.981108150950.14310A-100000@tasam.com> References: <Pine.BSF.3.96.981108150950.14310A-100000@tasam.com>
index | next in thread | previous in thread | raw e-mail
In message <Pine.BSF.3.96.981108150950.14310A-100000@tasam.com> Security writes: : I've noticed our socks5 dumping core quite often. It's stopped now, but : about a week ago it was acting up. The socks folks fixed a security hole (usual buffer overrun) in socks5 1.0r5 or so. I'd upgrade to the latest socks if you haven't already. The latest FreeBSD port of socks5 has this fix in it. The core dumps may indicate that you are under attack and the attacker are Script |<ids that don't know you aren't running Linux. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the messagehome | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199811082121.OAA20841>
