Date: Fri, 27 Jul 2001 06:33:56 +0800 From: "jianzhong ren" <jian@linuxmail.org> To: kris@obsecurity.org Cc: FreeBSD Security <freebsd-security@FreeBSD.ORG> Subject: Re: some new exploit is out Message-ID: <20010726223356.21906.qmail@linuxmail.org>
next in thread | raw e-mail | index | archive | help
> On Fri, Jul 27, 2001 at 06:00:33AM +0800, jianzhong ren wrote: > > > > -----Original Message----- > > From: Kris Kennaway <kris@obsecurity.org> > > Date: Thu, 26 Jul 2001 14:52:58 -0700 > > To: jianzhong ren <jian@linuxmail.org> > > Subject: Re: some new exploit is out > > > > > > > On Fri, Jul 27, 2001 at 05:46:41AM +0800, jianzhong ren wrote: > > > > > > > i know that pacth for telnet is out too, but is there any new patch > > > > for shared signals vulnerability > > > > > > Yes, a while ago. You do read advisories, right? > > > > > > > adn portbinding shellcode? > > > > > > What's this one? > > > > > > Kris > > > > and this <A HREF="http://www.hack.co.za/download.php?sid=1445" TARGET="_new"><FONT COLOR="BLUE">http://www.hack.co.za/download.php?sid=1445</FONT></A> for setreuid(0,0) execve /bin/sh shellcode(29 bytes) > > > > > Oh, I see..you're talking about examples of shellcode, not FreeBSD > vulnerabilities. That has little to no relevance to anyone on this > list unless you're a script kiddie. > i'm not a script kiddie but may be some of my user. the company where i work offer shell server in freebsd, and i want to prepare my shelll server for any kind exploit. thank you -- Get your free email from www.linuxmail.org Powered by Outblaze To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010726223356.21906.qmail>