Date: Wed, 9 Oct 2002 10:12:37 -0700 From: Claus Assmann <freebsd+security@esmtp.org> To: freebsd-security@FreeBSD.ORG Subject: Re: Sendmail trojan...? Message-ID: <20021009101237.A11608@zardoc.esmtp.org> In-Reply-To: <5.1.1.6.0.20021009125538.04748c18@marble.sentex.ca>; from mike@sentex.net on Wed, Oct 09, 2002 at 01:00:49PM -0400 References: <20021009142546.GA27227@darkstar.doublethink.cx> <3DA3AE76.1070006@deevil.homeunix.org> <20021009142546.GA27227@darkstar.doublethink.cx> <20021009080341.A26616@zardoc.esmtp.org> <5.1.1.6.0.20021009125538.04748c18@marble.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Oct 09, 2002, Mike Tancsa wrote: > > Hi, > Do you know the method they used to get in ? OpenSSL/https then > local root exploit ? Although netcraft says > Apache/1.3.26 (Unix) mod_ssl/2.8.10 OpenSSL/0.9.6e on FreeBSD We don't know (yet). If you can help us trying to figure this out, please contact sendmail-security at sendmail.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20021009101237.A11608>