Bugtraq mailing list archives
exploit for CERT advisory CA-98.11?
From: cromar () PHOENIX PRINCETON EDU (Scott Cromar)
Date: Fri, 18 Sep 1998 11:47:17 -0400
Several of our Solaris 2.6 systems appear to be under attack using whatever exploit prompted CERT advisory CA-98.11. As near as I can tell, turning off stack executability appears to be protecting us from the attack, though core files are generated each time. (The core files have been forwarded to Sun.) According to Sun the patches 105802-06 and 104489-08 do not resolve the buffer overflow problem with rpc.ttdbserverd. For my own sanity, I would appreciate it if someone would forward me the exploit that prompted CA-98.11. I would like to test our systems for this vulnerability. --Scott
Current thread:
- Re: Buffer overflows in Minicom 1.80.1 M.C.Mar (Aug 31)
- <Possible follow-ups>
- Re: Buffer overflows in Minicom 1.80.1 M.C.Mar (Sep 02)
- Re: Buffer overflows in Minicom 1.80.1 Patrick J. Volkerding (Sep 02)
- Re: Buffer overflows in Minicom 1.80.1 Patrick J. Volkerding (Sep 02)
- Re: Buffer overflows in Minicom 1.80.1 Patrick J. Volkerding (Sep 02)
