Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Jan 2001 12:31:20 -0500
From:      Chris Faulhaber <jedgar@fxp.org>
To:        "Steven G. Kargl" <kargl@troutmask.apl.washington.edu>
Cc:        freebsd-security@freebsd.org
Subject:   Re: buffer overflows in rpc.statd?
Message-ID:  <20010125123120.A60926@peitho.fxp.org>
In-Reply-To: <200101251726.f0PHQei65827@troutmask.apl.washington.edu>; from kargl@troutmask.apl.washington.edu on Thu, Jan 25, 2001 at 09:26:39AM -0800
References:  <200101251726.f0PHQei65827@troutmask.apl.washington.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jan 25, 2001 at 09:26:39AM -0800, Steven G. Kargl wrote:
> Are there any known compromises of rpc.statd that involve
> buffer overflows?  I have several entries in /var/log/messages that
> look suspicious, but I currently don't know what these entries
> mean (see attachment).   The suspicious entries appear to be
> buffers that someone or something has tried to overflow.
> 

No, someone is trying to use a Linux rpc.statd exploit on your box,
to which the BSD's were never vulnerable (see previous posts on
this topic for more info).

-- 
Chris D. Faulhaber - jedgar@fxp.org - jedgar@FreeBSD.org
--------------------------------------------------------
FreeBSD: The Power To Serve   -   http://www.FreeBSD.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010125123120.A60926>