Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Jan 2001 11:46:33 -0600
From:      "Scot W. Hetzel" <hetzels@westbend.net>
To:        <freebsd-security@FreeBSD.ORG>
Subject:   Re: buffer overflows in rpc.statd?
Message-ID:  <026c01c086f6$c2c151e0$7d7885c0@genroco.com>
References:  <200101251726.f0PHQei65827@troutmask.apl.washington.edu> <024b01c086f6$0cfda480$7d7885c0@genroco.com>

next in thread | previous in thread | raw e-mail | index | archive | help
From: "Scot W. Hetzel" <hetzels@westbend.net>
>
> Anybody have an Ideal as to what this is?
>
> Jan 25 03:27:48 spare rpc.statd: invalid hostname to sm_stat:
>
^X\xf7\xff\xbf^X\xf7\xff\xbf^Y\xf7\xff\xbf^Y\xf7\xff\xbf^Z\xf7\xff\xbf^Z\xf7
> \x

Thanks, Chris for letting us know it's a linux exploit.

Is there anyway that we can find the IP address of the script kiddie using
this exploit so we can inform their ISP.

Thanks,

Scot



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?026c01c086f6$c2c151e0$7d7885c0>