Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Aug 2000 20:21:36 -0700 (PDT)
From:      Kris Kennaway <kris@hub.freebsd.org>
To:        David La Croix <dlacroix@cowpie.acm.vt.edu>
Cc:        freebsd-security@freebsd.org
Subject:   Re: rpc.statd -- is someone trying to exploit a buffer overflow?
Message-ID:  <Pine.BSF.4.21.0008172019350.7587-100000@hub.freebsd.org>
In-Reply-To: <200008172123.RAA16515@cowpie.acm.vt.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 17 Aug 2000, David La Croix wrote:

> 
> I manage a fileserver for my company, and it happens to be running 
> FreeBSD 3.4-Stable (April 10) with NFS enabled:
> 
> I've noticed repeated messages of the form:
> DATE maurice rpc.statd: invalid hostname to sm_stat: lots of binary crap.

Most linux distributions had a root exploit in rpc.statd recently..the %8x
operators indicate thats what they're trying to exploit here.

But never fear, FreeBSD has no vulnerability here :-)

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
    -- Charles Forsythe <forsythe@alum.mit.edu>




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0008172019350.7587-100000>