I guess we should expect a whole lot of attempts to connect to the ports
used by NTP once the script kiddies figure this one out.
I probably average about 20 connect attempts to ports 53 and 111 every day.
jmb
>Package: ntp
>Vulnerability: remote root exploit
>Debian-specific: no
>
>Przemyslaw Frasunek <[EMAIL PROTECTED]> reported that ntp
>daemons such as that released with Debian GNU/Linux are vulnerable to a
>buffer overflow that can lead to a remote root exploit. This has been
>corrected for Debian 2.2 (potato) in ntp version 4.0.99g-2potato1.
>
>We recommend you upgrade your ntp package immediately.
>
>wget url
> will fetch the file for you
>dpkg -i file.deb
> will install the referenced file.
--------
The Arthem Group
- Your number one source for web site design and hosting services
[EMAIL PROTECTED]
http://www.arthem.com
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]