Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 7 Nov 1999 12:58:58 -0500 (EST)
From:      Robert Watson <robert@cyrus.watson.org>
To:        freebsd-security@freebsd.org
Subject:   Nov  6 18:47:25 fledge /kernel: pid 3988 (sendmail), uid 0: exited , on signal 4
Message-ID:  <Pine.BSF.3.96.991107120929.6237A-100000@fledge.watson.org>

next in thread | raw e-mail | index | archive | help

Noticed this in my system log:

Nov  6 18:47:25 fledge /kernel: pid 3988 (sendmail), uid 0: exited on
signal 4

This doesn't normally happen and is a bit concerning.

fledge:~> telnet localhost 25
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
220 fledge.watson.org ESMTP Sendmail 8.9.3/8.9.3; Sun, 7 Nov 1999 12:27:54
-0500 (EST)

Which is the default version shipped in 3.3-RELEASE (or at least, this is
currently a vanilla 3.3-RELEASE box :-).

I'm concerned this could be a buffer-based attack, but don't see any of
the signs of a successful compromise.  Also, there were no signs of a
scan of other open ports at the time.

Has anyone else seen any of these lately?

  Robert N M Watson 

robert@fledge.watson.org              http://www.watson.org/~robert/
PGP key fingerprint: AF B5 5F FF A6 4A 79 37  ED 5F 55 E9 58 04 6A B1
TIS Labs at Network Associates, Safeport Network Services



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.991107120929.6237A-100000>