On Thu, Apr 05, 2001 at 12:12:17PM -0500, JonesMB wrote:
> I guess we should expect a whole lot of attempts to connect to the ports
> used by NTP once the script kiddies figure this one out.
>
> I probably average about 20 connect attempts to ports 53 and 111 every day.
port 137 has also a good average.
>
> jmb
>
> >Package: ntp
> >Vulnerability: remote root exploit
> >Debian-specific: no
> >
> >Przemyslaw Frasunek <[EMAIL PROTECTED]> reported that ntp
> >daemons such as that released with Debian GNU/Linux are vulnerable to a
> >buffer overflow that can lead to a remote root exploit. This has been
> >corrected for Debian 2.2 (potato) in ntp version 4.0.99g-2potato1.
> >
> >We recommend you upgrade your ntp package immediately.
> >
> >wget url
> > will fetch the file for you
> >dpkg -i file.deb
> > will install the referenced file.
>
> --------
> The Arthem Group
> - Your number one source for web site design and hosting services
> [EMAIL PROTECTED]
> http://www.arthem.com
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>
>
>
--
Philippe BARNETCHE
AGISphere
14, Boulevard Vital Bouhot
92200 NEUILLY/SEINE
01 47 45 99 92
06 10 01 68 11
"He who sacrifices functionality for ease of use
loses both and deserves neither."
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]