Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Jul 2001 16:58:45 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        jianzhong ren <jian@linuxmail.org>
Cc:        kris@obsecurity.org, FreeBSD Security <freebsd-security@FreeBSD.ORG>
Subject:   Re: some new exploit is out
Message-ID:  <20010726165845.A86561@xor.obsecurity.org>
In-Reply-To: <20010726223356.21906.qmail@linuxmail.org>; from jian@linuxmail.org on Fri, Jul 27, 2001 at 06:33:56AM %2B0800
References:  <20010726223356.21906.qmail@linuxmail.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--7AUc2qLy4jB3hD7Z
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Fri, Jul 27, 2001 at 06:33:56AM +0800, jianzhong ren wrote:

> &gt; Oh, I see..you're talking about examples of shellcode, not FreeBSD
> &gt; vulnerabilities.  That has little to no relevance to anyone on this
> &gt; list unless you're a script kiddie.
> &gt;=20
> i'm not a script kiddie but may be some of my user.
> the company where i work offer shell server in freebsd, and i want to pre=
pare my shelll server for any kind exploit.

"New" examples of shellcode aren't new exploits for FreeBSD, they're
pieces which can be used by someone in writing an exploit for a
given vulnerability.

Kris

--7AUc2qLy4jB3hD7Z
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE7YK60Wry0BWjoQKURAq+wAKC3Myq3M22munqHaoi2dU1yDBXTxgCgrks+
b41ZMkYCIZ8R7AAwddrRcTg=
=UkzZ
-----END PGP SIGNATURE-----

--7AUc2qLy4jB3hD7Z--

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010726165845.A86561>