Date: Wed, 17 Jan 2001 07:47:23 +0100 From: "Walter W. Hop" <walter@binity.com> To: "Michael R. Wayne" <wayne@staff.msen.com> Cc: hackers@FreeBSD.ORG Subject: Re: Protections on inetd (and /sbin/* /usr/sbin/* in general) Message-ID: <19357397493.20010117074723@binity.com> In-Reply-To: <200101170335.WAA18537@manor.msen.com> References: <200101170335.WAA18537@manor.msen.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> The exploit managed to start inetd, camped on the specified port I guess, if it doesn't exist already, that it wouldn't be so hard to create a small patch to the kernel, so that only processes owned by root, or a certain group of users (let's say "daemon"), were allowed to set up listeners... walter -- Walter W. Hop <walter@binity.com> | +31 6 24290808 | NEW KEY: 0x84813998 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19357397493.20010117074723>