Date: 04 May 1999 23:22:44 +0200 From: Dag-Erling Smorgrav <des@ifi.uio.no> To: security@freebsd.org Subject: [Jamie Rishaw <jamie@exodus.net>] FreeBSD 3.1 remote reboot exploit Message-ID: <xzpwvyottqz.fsf@hrotti.ifi.uio.no>
next in thread | raw e-mail | index | archive | help
------- Start of forwarded message -------
Message-ID: <19990501031840.A24252@dilbert.exodus.net>
Date: Sat, 1 May 1999 03:18:40 -0500
Reply-To: jamie@exodus.net
From: Jamie Rishaw <jamie@exodus.net>
Subject: FreeBSD 3.1 remote reboot exploit
To: BUGTRAQ@NETSPACE.ORG
Hi,
Sorry to be so vague, but I wanted to let everyone know,
It's been demonstrated to me by two people who will not reveal "how"
that there is a remote bug exploit, almost certainly over IP, that will
cause FreeBSD-3.1 systems to reboot with no warnings.
The second box this was demonstrated on today had no open services
besides ircd, and was remote rebooted. (The first box had open services
such as smtp, ssh, pop, http, but did /not/ run ircd, eliminating ircd
as the culprit).
If anyone can shed some light on this (really bad) issue, it'd be
greatly appreciated, especially since I am(was) in the process of
upgrading all of my boxes to 3.1. (3.1-REL).
Regards,
-jamie
--
jamie rishaw (efnet:gavroche) -- Exodus Communications, Inc.
>Sr. Network Engr, Chicago, SoCal Data Centers
<jimmie> In an interesting move Exodus Communications annouced today that
they have replaced all of their backbone engineers with furby's
------- End of forwarded message -------
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpwvyottqz.fsf>
