From owner-freebsd-security Mon Jan 17 7:53:28 2000 Delivered-To: freebsd-security@freebsd.org Received: from cichlids.com (pC19F54B2.dip0.t-ipconnect.de [193.159.84.178]) by hub.freebsd.org (Postfix) with ESMTP id 8919614E48 for ; Mon, 17 Jan 2000 07:53:20 -0800 (PST) (envelope-from alex@cichlids.com) Received: from cichlids.cichlids.com (cichlids.cichlids.com [192.168.0.10]) by cichlids.com (Postfix) with ESMTP id 7793CAB98; Mon, 17 Jan 2000 16:53:29 +0100 (CET) Received: (from alex@localhost) by cichlids.cichlids.com (8.9.3/8.9.3) id QAA06219; Mon, 17 Jan 2000 16:53:25 +0100 (CET) (envelope-from alex) Date: Mon, 17 Jan 2000 16:53:25 +0100 From: Alexander Langer To: Omachonu Ogali Cc: Jonathan Fortin , freebsd-security@FreeBSD.ORG Subject: Re: sh? Message-ID: <20000117165325.C5975@cichlids.cichlids.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0i In-Reply-To: ; from oogali@intranova.net on Mon, Jan 17, 2000 at 08:44:44AM -0500 X-PGP-Fingerprint: 44 28 CA 4C 46 5B D3 A8 A8 E3 BA F3 4E 60 7D 7F X-Verwirrung: Dieser Header dient der allgemeinen Verwirrung. Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Thus spake Omachonu Ogali (oogali@intranova.net): > Most of the exploits out there use /bin/sh to launch attacks. On FreeBSD? Alex -- I doubt, therefore I might be. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message