On Sun, Jul 13, 2003 at 11:55:45PM -0400, Matt Zimmerman wrote:
> If the user can read files in /tmp, they can execute the code in them.
even if the user is a "nobody" that owns no files or directories
and grsecurity, selinux or the like prevents him/her to execute
directly code from world writeab
On Sun, Jul 13, 2003 at 11:55:45PM -0400, Matt Zimmerman wrote:
> If the user can read files in /tmp, they can execute the code in them.
even if the user is a "nobody" that owns no files or directories
and grsecurity, selinux or the like prevents him/her to execute
directly code from world writeab
On Sun, May 12, 2002 at 09:58:33AM +0800, dave toh wrote:
> Can anyone help to provide pointers to find out which process is owning the
> port? I don't think netstat in solaris can do the job as in linux (-npl).
does solaris have fuser or lsof ?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
wi
On Sun, May 12, 2002 at 09:58:33AM +0800, dave toh wrote:
> Can anyone help to provide pointers to find out which process is owning the
> port? I don't think netstat in solaris can do the job as in linux (-npl).
does solaris have fuser or lsof ?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
w
On Sat, Mar 09, 2002 at 12:29:27AM -0600, John Reinke wrote:
> the ones concerned. On my plain potato box, I get:
> SSH Version OpenSSH_2.3.0p1, protocol versions 1.5/2.0.
Quite probably you are vunlnerable to this and many previous
attacks.
Did you install the unofficial kde2 for potato? I tkink
On Sat, Mar 09, 2002 at 12:29:27AM -0600, John Reinke wrote:
> the ones concerned. On my plain potato box, I get:
> SSH Version OpenSSH_2.3.0p1, protocol versions 1.5/2.0.
Quite probably you are vunlnerable to this and many previous
attacks.
Did you install the unofficial kde2 for potato? I tkink
6 matches
Mail list logo