Date: Thu, 26 Jul 2001 16:58:45 -0700 From: Kris Kennaway <kris@obsecurity.org> To: jianzhong ren <jian@linuxmail.org> Cc: kris@obsecurity.org, FreeBSD Security <freebsd-security@FreeBSD.ORG> Subject: Re: some new exploit is out Message-ID: <20010726165845.A86561@xor.obsecurity.org> In-Reply-To: <20010726223356.21906.qmail@linuxmail.org>; from jian@linuxmail.org on Fri, Jul 27, 2001 at 06:33:56AM %2B0800 References: <20010726223356.21906.qmail@linuxmail.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--7AUc2qLy4jB3hD7Z Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, Jul 27, 2001 at 06:33:56AM +0800, jianzhong ren wrote: > > Oh, I see..you're talking about examples of shellcode, not FreeBSD > > vulnerabilities. That has little to no relevance to anyone on this > > list unless you're a script kiddie. > >=20 > i'm not a script kiddie but may be some of my user. > the company where i work offer shell server in freebsd, and i want to pre= pare my shelll server for any kind exploit. "New" examples of shellcode aren't new exploits for FreeBSD, they're pieces which can be used by someone in writing an exploit for a given vulnerability. Kris --7AUc2qLy4jB3hD7Z Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7YK60Wry0BWjoQKURAq+wAKC3Myq3M22munqHaoi2dU1yDBXTxgCgrks+ b41ZMkYCIZ8R7AAwddrRcTg= =UkzZ -----END PGP SIGNATURE----- --7AUc2qLy4jB3hD7Z-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010726165845.A86561>