Saw it yesterday and sure enough, it crashes my Exim with a segfault. I
run Exim on Debian 2.2 with no modifications.
-A. Dave
xbud wrote:
Not sure if this made to this list.
I haven't confirmed the following, but thought it was worth forwarding.
-xbud
-- Forwarded Message
Not that I like security-through-obscurity, but if a cracker runs
scanssh on me and sees I am running Debian there is that much less to
figure out. I can understand the maintainer's point of view, but I
would rather audit my network SSH installs manually. So I would be
interested in removing
I have a number of Debian 2.2 systems that have some critical daemons
running as root. The most concerning offender is BIND8. BIND has been
tried and convicted, and by judging its turbulent past, I have no choice
but to demote it from its root status. I don't have dynamic interfaces
for
I have a number of Debian 2.2 systems that have some critical daemons
running as root. The most concerning offender is BIND8. BIND has been
tried and convicted, and by judging its turbulent past, I have no choice
but to demote it from its root status. I don't have dynamic interfaces
for it
BIND should be treated with the utmost caution, as CERT has listed it as
the #1 way to break into a computer and Im sure some of us have had
k1dd13z on our systems because of it. I know I have seen this
discussion before in old USENET posts, but I do think it would be a good
idea to maybe
martin f krafft wrote:
also sprach Adam Warner [EMAIL PROTECTED] [2002.01.21.1444 +0100]:
Martin, it's a server in my spare room :-) The only person installing a
backdoor on the server would be an unlawful intruder. Or a cat who can
type ;-) Your points are well taken and I would follow the
martin f krafft wrote:
also sprach Adam Warner [EMAIL PROTECTED] [2002.01.21.1444 +0100]:
Martin, it's a server in my spare room :-) The only person installing a
backdoor on the server would be an unlawful intruder. Or a cat who can
type ;-) Your points are well taken and I would follow the
Though I have supported Sendmail in Big-Iron environments, I am now
using the Default Debian Exim to serve mail. I have been happy with
Exim and it has served me reliably. Yet I don't often hear its name
used as an alternative to Sendmail. Usually I hear Postfix or Qmail.
Though I have
Ping for IPv6. You should see other utilities that end with 6 as well.
-A. Dave
Répási Tibor wrote:
Hy!
What is /bin/ping6 ??? Is it normal that /bin/ping and /bin/ping6 has setuid
to root?
regards,
Tibor Repasi
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
Though I have supported Sendmail in Big-Iron environments, I am now
using the Default Debian Exim to serve mail. I have been happy with
Exim and it has served me reliably. Yet I don't often hear its name
used as an alternative to Sendmail. Usually I hear Postfix or Qmail.
Though I have used
Ping for IPv6. You should see other utilities that end with 6 as well.
-A. Dave
Répási Tibor wrote:
Hy!
What is /bin/ping6 ??? Is it normal that /bin/ping and /bin/ping6 has setuid
to root?
regards,
Tibor Repasi
No Fear:
Well, if you are using Debian stable/Potato, add the line:
deb http://security.debian.org potato/updates main contrib non-free
to your sources.list. Then apt-get update ; apt-get upgrade.
If SID/testing, just apt-get update ; apt-get upgrade. If none of the
above, merely go nab
No Fear:
Well, if you are using Debian stable/Potato, add the line:
deb http://security.debian.org potato/updates main contrib non-free
to your sources.list. Then apt-get update ; apt-get upgrade.
If SID/testing, just apt-get update ; apt-get upgrade. If none of the
above, merely go nab
OTOH, if somebody obtains root privileges, he can probably plant a
kernel in the swapfile and instruct the boot loader to load it on the
next reboot. AFAIK, most if not all checksumming tools don't deal
properly with such scenarios.
Quite a scary scenario. How could one plant a file in
14 matches
Mail list logo