Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 6 Jul 2003 16:10:57 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        "Dave [Hawk-Systems]" <dave@hawk-systems.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: rpc.statd: invalid hostname to sm_stat
Message-ID:  <20030706231057.GA21037@rot13.obsecurity.org>
In-Reply-To: <DBEIKNMKGOBGNDHAAKGNMEIFCBAC.dave@hawk-systems.com>
References:  <DBEIKNMKGOBGNDHAAKGNMEIFCBAC.dave@hawk-systems.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--gBBFr7Ir9EOA20Yy
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Sun, Jul 06, 2003 at 02:37:36PM -0400, Dave [Hawk-Systems] wrote:
> I received an answer to this before and it was that FreeBSD isn't vulnerable to
> this type of attack, but the log entries persist in varrying degrees of
> reoccurance.

This is a FAQ.  It's an attempt to exploit an old Linux vulnerability.

kris

--gBBFr7Ir9EOA20Yy
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (FreeBSD)

iD8DBQE/CKyBWry0BWjoQKURAgQEAJ9OIml1FZNB55Qv2oCXLGfISiDylgCcC7fC
WX6wZkjiHO2mE3MpsabiIqM=
=NZZc
-----END PGP SIGNATURE-----

--gBBFr7Ir9EOA20Yy--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030706231057.GA21037>