Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Jan 2001 09:31:47 -0800
From:      Alfred Perlstein <bright@wintelcom.net>
To:        "Steven G. Kargl" <kargl@troutmask.apl.washington.edu>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: buffer overflows in rpc.statd?
Message-ID:  <20010125093147.M26076@fw.wintelcom.net>
In-Reply-To: <200101251726.f0PHQei65827@troutmask.apl.washington.edu>; from kargl@troutmask.apl.washington.edu on Thu, Jan 25, 2001 at 09:26:39AM -0800
References:  <200101251726.f0PHQei65827@troutmask.apl.washington.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
* Steven G. Kargl <kargl@troutmask.apl.washington.edu> [010125 09:29] wrote:
> Are there any known compromises of rpc.statd that involve
> buffer overflows?  I have several entries in /var/log/messages that
> look suspicious, but I currently don't know what these entries
> mean (see attachment).   The suspicious entries appear to be
> buffers that someone or something has tried to overflow.

Kiddies running linux exploits against your box.

-Alfred


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010125093147.M26076>