SR> Date: Fri, 06 Dec 2002 15:05:36 +0000
SR> From: Steve Root

SR> Surely that is only once they have a command line / terminal
SR> prompt though?

No.


SR> They would have to get past one of the user passwords first?

Not at all.  A remote root exploit means one runs a magic program
that "picks the lock" and gives root access.

Check out L0pht, Phrack, 2600, or Google for "stack overflow",
"format string", and "race conditions".  There are many good
tutorials that explain how these things work.  Many of them
assume one is familiar with assembly language and computer
architecture, though...


Eddy
--
Brotsman & Dreger, Inc. - EverQuick Internet Division
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 (785) 865-5885 Lawrence and [inter]national
Phone: +1 (316) 794-8922 Wichita

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to <[EMAIL PROTECTED]>, or you are likely to
be blocked.

_______________________________________________
cobalt-security mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-security

Reply via email to