On Mon, Nov 04, 2002 at 01:36:36PM +, David Wright wrote:
Quoting Phillip Hofmeister ([EMAIL PROTECTED]):
What's this about? _
2. Remove the setuid bit from the XaoS binary by executing the
following command:
# chmod -s
Quoting Phillip Hofmeister ([EMAIL PROTECTED]):
From: David Endler [EMAIL PROTECTED]
[...]In a default abuse installation in
Debian Linux, both abuse.console and abuse.x11R6 can be used in
exploitation; both files are set group id games, and abuse.console is
set user id root.
What's this
On Mon, Nov 04, 2002 at 01:36:36PM +, David Wright wrote:
Quoting Phillip Hofmeister ([EMAIL PROTECTED]):
What's this about? _
2. Remove the setuid bit from the XaoS binary by executing the
following command:
# chmod -s
Quoting Phillip Hofmeister ([EMAIL PROTECTED]):
From: David Endler [EMAIL PROTECTED]
[...]In a default abuse installation in
Debian Linux, both abuse.console and abuse.x11R6 can be used in
exploitation; both files are set group id games, and abuse.console is
set user id root.
What's this
I am sure you have all seen this...but just in case.
Phil
- Forwarded message from David Endler [EMAIL PROTECTED] -
From: David Endler [EMAIL PROTECTED]
Subject: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in Abuse
To: [EMAIL PROTECTED]
Date: Fri, 1 Nov 2002
I am sure you have all seen this...but just in case.
Phil
- Forwarded message from David Endler [EMAIL PROTECTED] -
From: David Endler [EMAIL PROTECTED]
Subject: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in
Abuse
To: bugtraq@securityfocus.com
Date: Fri, 1 Nov
6 matches
Mail list logo