On Mon, Nov 04, 2002 at 01:36:36PM +, David Wright wrote:
> Quoting Phillip Hofmeister ([EMAIL PROTECTED]):
> What's this about? _
>
>
> > 2. Remove the setuid bit from the XaoS binary by executing the
> > following command:
> >
> >
On Mon, Nov 04, 2002 at 01:36:36PM +, David Wright wrote:
> Quoting Phillip Hofmeister ([EMAIL PROTECTED]):
> What's this about? _
>
>
> > 2. Remove the setuid bit from the XaoS binary by executing the
> > following command:
> >
> >
Quoting Phillip Hofmeister ([EMAIL PROTECTED]):
> From: "David Endler" <[EMAIL PROTECTED]>
> [...]In a default abuse installation in
> Debian Linux, both abuse.console and abuse.x11R6 can be used in
> exploitation; both files are set group id games, and abuse.console is
> set user id root.
What's
Quoting Phillip Hofmeister ([EMAIL PROTECTED]):
> From: "David Endler" <[EMAIL PROTECTED]>
> [...]In a default abuse installation in
> Debian Linux, both abuse.console and abuse.x11R6 can be used in
> exploitation; both files are set group id games, and abuse.console is
> set user id root.
What's
I am sure you have all seen this...but just in case.
Phil
- Forwarded message from David Endler <[EMAIL PROTECTED]> -
From: "David Endler" <[EMAIL PROTECTED]>
Subject: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in
Abuse
To: bugtraq@securityfocus.com
Date: Fri, 1
I am sure you have all seen this...but just in case.
Phil
- Forwarded message from David Endler <[EMAIL PROTECTED]> -
From: "David Endler" <[EMAIL PROTECTED]>
Subject: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in Abuse
To: [EMAIL PROTECTED]
Date: Fri, 1 Nov 2002
6 matches
Mail list logo