> Sep 24 15:20:25 host kernel: Packet log: input DENY eth0 \
> PROTO=17 10.209.80.109:68 255.255.255.255:67 \
> L=576 S=0x00 I=9145 F=0x4000 T=32 (#11)
>
proto=17 -> look at /etc/protocols -> yes, udp
> This seems to be a broadcast by the DHCP server of my cable provider,
> right?
>
> It's possible to make .plan or .project to be named pipes, which means that
> the act of reading them can cause code to be executed. If finger executes
> suid root, then said code can execute as root. The potential for mischief
> should be obvious.
>
could you explain this a bit?
from my knowl
2 matches
Mail list logo