Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 09 Oct 2002 13:00:49 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: Sendmail trojan...?
Message-ID:  <5.1.1.6.0.20021009125538.04748c18@marble.sentex.ca>
In-Reply-To: <20021009080341.A26616@zardoc.esmtp.org>
References:  <20021009142546.GA27227@darkstar.doublethink.cx> <3DA3AE76.1070006@deevil.homeunix.org> <20021009142546.GA27227@darkstar.doublethink.cx>

next in thread | previous in thread | raw e-mail | index | archive | help

Hi,
         Do you know the method they used to get in ? OpenSSL/https then 
local root exploit ?  Although netcraft says
Apache/1.3.26 (Unix) mod_ssl/2.8.10 OpenSSL/0.9.6e on FreeBSD



         ---Mike

At 08:03 AM 09/10/2002 -0700, Claus Assmann wrote:
>On Wed, Oct 09, 2002, Chris Faulhaber wrote:
>
> > Yes, the source in the tree has been verified against the
> > signed tarball; plus, it was the configure script that was
> > backdoored which buildworld does not use.
>
>It was not the configure script. I'm wondering who came up with
>this rumor; please stop spreading it.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.1.6.0.20021009125538.04748c18>