Displaying 4 results from an estimated 4 matches for "pangeia".
Did you mean:
pangea
1997 Sep 03
0
Announce: chkexploit 1.13
...chkexploit
Version: 1.13
Entered-date: 31AUG97
Description: Check the system for vulnerabilities to some publicly
available exploits.
Keywords: security exploits vulnerabilities
Author: jessen@ahand.unicamp.br (Klaus Steding-Jessen)
nelson@pangeia.com.br (Nelson Murilo)
vazquez@iqm.unicamp.br (Pedro A M Vazquez)
Maintained-by:
Primary-site: ftp.pangeia.com.br /pub/pub/seg/pac
10kB chkexploit-1.13.tar.gz
57 chkexploit-1.13.tar.gz.md5
Alternate-site:
Original-site:
Platforms: Linux/Fr...
2003 Aug 14
2
chkrootkit reports INFECTED :(
Hi!
Running chkrootkit on newly installed FreeBSD 5.0 got:
-cut-
Checking `basename'... not infected
Checking `biff'... not infected
Checking `chfn'... INFECTED
Checking `chsh'... INFECTED
Checking `cron'... not infected
Checking `date'... INFECTED
-cut-
Checking `ls'... INFECTED
-cut-
Checking `ps'... INFECTED
Checking `pstree'... not found
-cut-
What does it
2003 Aug 24
2
[solution] chkrootkit reports infected files
Hey all,
I've submitted a fix for chkrootkit port, to solve the
false positives on FreeBSD 5 and higher:
http://www.freebsd.org/cgi/query-pr.cgi?pr=55919
The topic, btw, should be "Teach security/chkrootkit
about FreeBSD 5", but it's not my first typo today.
Maintainer, please approve.
Authors, please see if you can include the changes.
I also fixed a minor bug in chk_vdir.
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has
gone out on linux-security..... -- REW]
-----BEGIN PGP SIGNED MESSAGE-----
Content-Type: text/plain; charset=us-ascii
Has anyone been hit with the Bind Inverse Query Buffer Overrun on
their Linux servers? We have had 3 servers attacked using this
expoit and all of the machines had several binaries replaced with
trojan