Date: Sun, 6 Jul 2003 16:10:57 -0700 From: Kris Kennaway <kris@obsecurity.org> To: "Dave [Hawk-Systems]" <dave@hawk-systems.com> Cc: freebsd-questions@freebsd.org Subject: Re: rpc.statd: invalid hostname to sm_stat Message-ID: <20030706231057.GA21037@rot13.obsecurity.org> In-Reply-To: <DBEIKNMKGOBGNDHAAKGNMEIFCBAC.dave@hawk-systems.com> References: <DBEIKNMKGOBGNDHAAKGNMEIFCBAC.dave@hawk-systems.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--gBBFr7Ir9EOA20Yy Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Sun, Jul 06, 2003 at 02:37:36PM -0400, Dave [Hawk-Systems] wrote: > I received an answer to this before and it was that FreeBSD isn't vulnerable to > this type of attack, but the log entries persist in varrying degrees of > reoccurance. This is a FAQ. It's an attempt to exploit an old Linux vulnerability. kris --gBBFr7Ir9EOA20Yy Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (FreeBSD) iD8DBQE/CKyBWry0BWjoQKURAgQEAJ9OIml1FZNB55Qv2oCXLGfISiDylgCcC7fC WX6wZkjiHO2mE3MpsabiIqM= =NZZc -----END PGP SIGNATURE----- --gBBFr7Ir9EOA20Yy--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030706231057.GA21037>