Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Jul 2001 16:58:45 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        jianzhong ren <jian@linuxmail.org>
Cc:        kris@obsecurity.org, FreeBSD Security <freebsd-security@FreeBSD.ORG>
Subject:   Re: some new exploit is out
Message-ID:  <20010726165845.A86561@xor.obsecurity.org>
In-Reply-To: <20010726223356.21906.qmail@linuxmail.org>; from jian@linuxmail.org on Fri, Jul 27, 2001 at 06:33:56AM %2B0800
References:  <20010726223356.21906.qmail@linuxmail.org>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Fri, Jul 27, 2001 at 06:33:56AM +0800, jianzhong ren wrote:

> &gt; Oh, I see..you're talking about examples of shellcode, not FreeBSD
> &gt; vulnerabilities.  That has little to no relevance to anyone on this
> &gt; list unless you're a script kiddie.
> &gt; 
> i'm not a script kiddie but may be some of my user.
> the company where i work offer shell server in freebsd, and i want to prepare my shelll server for any kind exploit.

"New" examples of shellcode aren't new exploits for FreeBSD, they're
pieces which can be used by someone in writing an exploit for a
given vulnerability.

Kris

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE7YK60Wry0BWjoQKURAq+wAKC3Myq3M22munqHaoi2dU1yDBXTxgCgrks+
b41ZMkYCIZ8R7AAwddrRcTg=
=UkzZ
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010726165845.A86561>