Displaying 20 results from an estimated 3000 matches similar to: "Re: Possible compromise ?"
2004 Feb 03
0
Re: Possible compromise ?
Yeah but if you are uncertain about your own box my VERY STRONG advise
is that you reinstall. IF your host is indeed owned, then you are a lot
further away then just reinstalling, god knows what issues can arrise
when a cracker exploits the system to do bogus tasks..
Then i say: Too bad for your time, sorry but it's like that
--
Kind regards,
Remko Lodder
Elvandar.org/DSINet.org
2004 Feb 15
6
Rooted system
Howyd all? Seems that I have been routed. Possibly
by a physical B&E, but who knows? Probably some
of you do.... anyways, some politically sensitive
email was deleted from a user account and the
line
low -tr &
inserted into my .xinitrc .
Duncan (Dhu) Campbell
2004 Jan 26
6
Kernel modules listing
Hi all,
please, is there some utility/command/... to list all installed kernel
modules ?
Peter Rosa
2004 Jul 17
3
upgrading form 4.2 to 5.x
Hello,
My company has been asked to help with the upgrade of several Freebsd
systems that are pretty old. The customer is running a file server samba
also running apache running FBSD 4.2, he wants to upgrade using cvsup &
the make buildworld procedure to upgrade to 5.x. Im very familier with the
make buildworld procedure however there have been significant changes
between 4.2 & 5.x so is
2004 Jun 12
2
Hacked or not appendice
Hi all again,
I must add, there are no log entries after June 9, 2004. "LKM" message first
apeared June 8, 2004, after this day, there is nothing in /var/messages,
/var/security .....
How could I look for suspicious LKM module ? How could I find it, if the
machine is hacked and I can not believe "ls", "find" etc. commands ?
Peter Rosa
2004 Jan 23
0
FW: ipfw + named problem
forgot this addr.
--
Kind regards,
Remko Lodder
Elvandar.org/DSINet.org
www.mostly-harmless.nl Dutch community for helping newcomers on the
hackerscene
-----Oorspronkelijk bericht-----
Van: Remko Lodder [mailto:remko@elvandar.org]
Verzonden: vrijdag 23 januari 2004 10:53
Aan: Nick Twaddell
Onderwerp: RE: [Freebsd-security] ipfw + named problem
did you tcpdump the packets so that you can
2004 May 17
4
Multi-User Security
Hello list.
I would like to get your opinion on what is a safe multi-user environment.
The scenario:
We would like to offer to some customers of ours some sort of network
backup/archive. They would put daily or weekly backups from their local
machine on our server using rsync and SSH. Therefore, they all have a user
account on our server. However, we must ensure that they would absolutely
not be
2005 Aug 21
1
Security warning with sshd
In my recent security email, I got the following errors:
cantona.dnswatchdog.com login failures:
Aug 20 02:37:19 cantona sshd[9444]: fatal: Write failed: Operation not permitted
Aug 20 04:30:42 cantona sshd[16142]: fatal: Write failed: Operation
not permitted
Aug 20 21:21:51 cantona sshd[45716]: fatal: Write failed: Operation
not permitted
So three questions: What is it? Should I be worried?
2006 Jul 28
2
Ruby vulnerability?
Hi,
FYI, Red Hat released an advisory today about a vulnerability in Ruby. So
far it doesn't appear in the VuXML, but am I correct in presuming it will
soon?
https://rhn.redhat.com/errata/RHSA-2006-0604.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3694
cheers,
-- Joel Hatton --
Infrastructure Manager | Hotline: +61 7 3365 4417
AusCERT - Australia's national
2004 Feb 07
0
Re: IPFIREWALL
Hi,
I dont think you can deny all ddos against your box, you will need help from
your isp.
That is because if a person sends you enough packets, like 1mbit (and your
line is 1mbit)
full of packets, your connection is stuck, whether you filter or not.
Though you can mitigate those by closing all non needed ports, log them if
any attempt is being
made to connect to them, and use a bogon list which
2006 Sep 13
2
ports / www/linux-seamonkey / flashplugin vulnerability
Hi!
Since linux-flashplugin7 r63 is vulnerable according to
http://vuxml.FreeBSD.org/7c75d48c-429b-11db-afae-000c6ec775d9.html
isn't www/linux-seamonkey vulerable, too (it seems to include 7 r25)?
Bye
Arne
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
2007 Jun 06
2
security weakness
Hello Remko: sorry to bother you again,after e mailing freebsd-security@FreeBSD.org mailing list, got a reply by the list moderator rejecting my message,stating that there is no valid message from that address,sugesting yet another email address, it doubts the authenticity of your recomendation
Remko, you sugested I should look into securing my emailserver installation by preventing unauthorized
2007 Aug 01
3
FreeBSD Security Advisory FreeBSD-SA-07:06.tcpdump
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:06.tcpdump Security Advisory
The FreeBSD Project
Topic: Buffer overflow in tcpdump(1)
Category: contrib
Module: tcpdump
Announced:
2007 Aug 01
3
FreeBSD Security Advisory FreeBSD-SA-07:06.tcpdump
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:06.tcpdump Security Advisory
The FreeBSD Project
Topic: Buffer overflow in tcpdump(1)
Category: contrib
Module: tcpdump
Announced:
2004 Mar 02
1
Re: FreeBSD Security AdvisoryFreeBSD-SA-04:04.tcp
yes unless you use the version as of :> 2004-03-02 17:24:46
UTC (RELENG_5_2, 5.2.1-RELEASE-p1)
check it out with uname -a
if it does not say -p1
it affects you.
My guess, you are affected :)
cheers
--
Kind regards,
Remko Lodder
Elvandar.org/DSINet.org
www.mostly-harmless.nl Dutch community for helping newcomers on the
hackerscene
-----Oorspronkelijk bericht-----
Van:
2005 Apr 29
6
IPFW disconnections and resets
Hi,
I am using IPFW on FreeBSD 4.11
I am facing two problems:
- SSH sessions timeout after a while
- When I run "/sbin/ipfw -q -f flush" in the rules script all connection
get reset (and I am thrown out of the box).
Is this standard functioning of ipfw or do I need to change any
configuration?
Thanks,
Siddhartha
2007 Jan 30
1
What about BIND 9.3.4 in FreeBSD in base system ?
http://www.isc.org/sw/bind/view/?release=9.3.4
SECURITY ADVISORIES
* CVE-2006-4095
CERT Vulnerability Note VU#915404
NISCC 172003
* CVE-2006-4096
CERT Vulnerability Note VU#697164
NISCC 172003
* CAN-2005-0034
NISCC-UNIRAS 20050125-00059
CERT Vulnerability Note VU#938617
[ODiP] == Dmitry Grigorovich
2007 Sep 28
2
OpenSSL bufffer overflow
I did not see any commits to the OpenSSL code, recently; is anybody
going to commit the fix?
See http://www.securityfocus.com/archive/1/480855/30/0 for details ...
Regards, STefan
2007 Jan 10
1
Recent vulnerabilities in xorg-server
Colin, good day!
Spotted two patches for x11-servers/xorg-server port: see entries for
x11r6.9.0-dbe-render.diff and x11r6.9.0-cidfonts.diff at
http://xorg.freedesktop.org/releases/X11R6.9.0/patches/index.html
Seems like they are not applied to the xorg-server-6.9.0_5. May be
it should be added to the VuXML document?
There is a ports/107733 issue that incorporates these patches. May
be you