Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 29 Dec 2006 14:40:22 -0500
From:      "Brandon S. Allbery KF8NH" <allbery@ece.cmu.edu>
To:        =?ISO-8859-1?Q?Thomas_Nystr=F6m?= <thn@saeab.se>, stable@freebsd.org
Subject:   Re: system breach
Message-ID:  <DA58496F-4D15-4FEB-8FEF-D30C6C076F98@ece.cmu.edu>
In-Reply-To: <45956418.8080805@saeab.se>
References:  <20061228231226.GA16587@lordcow.org>	<b91012310612282010m22a6bbdbp97bf7bdecca1530@mail.gmail.com>	<20061229155845.GA1266@lordcow.org> <45954196.9040909@saeab.se>	<20061229173916.GA3196@lordcow.org> <20061229181606.GA83815@icarus.home.lan> <45956418.8080805@saeab.se>

next in thread | previous in thread | raw e-mail | index | archive | help

On Dec 29, 2006, at 13:53 , Thomas Nystr=F6m wrote:

>> I'm wondering if maybe a PHP script is trying to do something with
>> pkg_fetch, and does something like setenv("PKG_TMPDIR", "/tmp/=20
>> download")
>> before calling system("pkg_fetch ...").  Why a PHP script would do
>> this, I don't know, but it wouldn't surprise me.
>
> See my other mail about a suspicous port (pear-1.4.11)

PEAR would also make sense; it's a (apparently lamer, at least =20
security-wise; then again, it *is* PHP :> ) CPAN-alike for PHP.

--=20
brandon s. allbery    [linux,solaris,freebsd,perl]     allbery@kf8nh.com
system administrator [openafs,heimdal,too many hats] allbery@ece.cmu.edu
electrical and computer engineering, carnegie mellon university    KF8NH






Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?DA58496F-4D15-4FEB-8FEF-D30C6C076F98>