Date: Wed, 09 Oct 2002 13:00:49 -0400 From: Mike Tancsa <mike@sentex.net> To: freebsd-security@FreeBSD.ORG Subject: Re: Sendmail trojan...? Message-ID: <5.1.1.6.0.20021009125538.04748c18@marble.sentex.ca> In-Reply-To: <20021009080341.A26616@zardoc.esmtp.org> References: <20021009142546.GA27227@darkstar.doublethink.cx> <3DA3AE76.1070006@deevil.homeunix.org> <20021009142546.GA27227@darkstar.doublethink.cx>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, Do you know the method they used to get in ? OpenSSL/https then local root exploit ? Although netcraft says Apache/1.3.26 (Unix) mod_ssl/2.8.10 OpenSSL/0.9.6e on FreeBSD ---Mike At 08:03 AM 09/10/2002 -0700, Claus Assmann wrote: >On Wed, Oct 09, 2002, Chris Faulhaber wrote: > > > Yes, the source in the tree has been verified against the > > signed tarball; plus, it was the configure script that was > > backdoored which buildworld does not use. > >It was not the configure script. I'm wondering who came up with >this rumor; please stop spreading it. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.1.6.0.20021009125538.04748c18>