Stanford, along with a large number of research institutions and high 
performance computing centers, has become a target for some sophisticated 
Linux and Solaris attacks. An unknown attacker (or group) has compromised 
numerous multi-user Solaris and Linux computers on Stanford's campus using a 
variety of mechanisms. In most cases, the attacker gets access to a machine 
by cracking or sniffing passwords. Local user accounts are escalated to root 
privileges by triggering a variety of local exploits, including the do_brk() 
and mremap() exploits on Linux and the sadmind, arbitrary kernel loading 
modules and passwd vulnerabilities on Solaris. 

ref: http://securecomputing.stanford.edu/alerts/multiple-unix-6apr2004.html

p.s. The message seems vary detailed and helpfull. 

-- 
--------------------
Uri Sharf, Linmagazine
http://linmagazine.co.il

=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to