search for: rewt

Displaying 4 results from an estimated 4 matches for "rewt".

Did you mean: ret
2012 Nov 27
1
virtio for 9.1-R
Hi guys, I can't see virtio in releng/9.1, is there any particular reason why it isn't going to be included given that it works reasonable well (and is optional anyway, so not likely to be detrimental)? Thanks, Joe
1999 Mar 26
2
Re: [Security - intern] *ALERT*: ADM Worm. Worm for Linux x86 found in wild.
On Fri, 26 Mar 1999, Thomas Biege wrote: > Date: Fri, 26 Mar 1999 09:34:10 +0100 (MET) > From: Thomas Biege <thomas@suse.de> > To: Jan-Philip Velders <jpv@jvelders.tn.tudelft.nl> > Cc: linux-security@redhat.com > Subject: Re: [Security - intern] [linux-security] *ALERT*: ADM Worm. Worm for Linux x86 found in wild. > The worm just exploits old security holes, so
1999 Nov 27
1
Re: Programming ...
...tor will put code into the string buffer and put the return > address of the code in the string buffer into the correct location in the > stack. When the program exits ... When the function returns ... > In one case I saw, a perp deleted /etc/hosts.deny, ran adduser to create > user rewt, then telnetted into the system. /etc/hosts.deny is now "chattr > -i". What stopped the perp in that case was that /etc/skel/.bashrc had an > exit at the end of the script. He was immediately logged out and went > away. He was using the buffer overflow in named 4.9.6 to do it...
1999 Nov 27
1
Re: Programming ...
...the daemon, running any code the perpetrator puts there. Usually that code runs one of the shell programs, with the stdin/stdout connected through the current tcp connection, or starting up its own tcp connection. In one case I saw, a perp deleted /etc/hosts.deny, ran adduser to create user rewt, then telnetted into the system. /etc/hosts.deny is now "chattr -i". What stopped the perp in that case was that /etc/skel/.bashrc had an exit at the end of the script. He was immediately logged out and went away. He was using the buffer overflow in named 4.9.6 to do it. In the pas...