Date: Thu, 17 Aug 2000 20:21:36 -0700 (PDT) From: Kris Kennaway <kris@hub.freebsd.org> To: David La Croix <dlacroix@cowpie.acm.vt.edu> Cc: freebsd-security@freebsd.org Subject: Re: rpc.statd -- is someone trying to exploit a buffer overflow? Message-ID: <Pine.BSF.4.21.0008172019350.7587-100000@hub.freebsd.org> In-Reply-To: <200008172123.RAA16515@cowpie.acm.vt.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 17 Aug 2000, David La Croix wrote: > > I manage a fileserver for my company, and it happens to be running > FreeBSD 3.4-Stable (April 10) with NFS enabled: > > I've noticed repeated messages of the form: > DATE maurice rpc.statd: invalid hostname to sm_stat: lots of binary crap. Most linux distributions had a root exploit in rpc.statd recently..the %8x operators indicate thats what they're trying to exploit here. But never fear, FreeBSD has no vulnerability here :-) Kris -- In God we Trust -- all others must submit an X.509 certificate. -- Charles Forsythe <forsythe@alum.mit.edu> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0008172019350.7587-100000>