Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 9 Oct 2002 10:12:37 -0700
From:      Claus Assmann <freebsd+security@esmtp.org>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: Sendmail trojan...?
Message-ID:  <20021009101237.A11608@zardoc.esmtp.org>
In-Reply-To: <5.1.1.6.0.20021009125538.04748c18@marble.sentex.ca>; from mike@sentex.net on Wed, Oct 09, 2002 at 01:00:49PM -0400
References:  <20021009142546.GA27227@darkstar.doublethink.cx> <3DA3AE76.1070006@deevil.homeunix.org> <20021009142546.GA27227@darkstar.doublethink.cx> <20021009080341.A26616@zardoc.esmtp.org> <5.1.1.6.0.20021009125538.04748c18@marble.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Oct 09, 2002, Mike Tancsa wrote:
> 
> Hi,
>          Do you know the method they used to get in ? OpenSSL/https then 
> local root exploit ?  Although netcraft says
> Apache/1.3.26 (Unix) mod_ssl/2.8.10 OpenSSL/0.9.6e on FreeBSD

We don't know (yet).

If you can help us trying to figure this out, please contact
sendmail-security at sendmail.org 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20021009101237.A11608>