[40849] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: resolved Re: should i publish a list of cracked machines?

daemon@ATHENA.MIT.EDU (Kevin Houle)
Thu Aug 23 13:42:22 2001

Date: Thu, 23 Aug 2001 13:41:42 -0400
From: Kevin Houle <kjh@cert.org>
To: Jim Mercer <jim@reptiles.org>, nanog@merit.edu
Message-ID: <29670000.998588502@corydoras.blue.cert.org>
In-Reply-To: <20010823123921.D10630@reptiles.org>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
 protocol="application/pgp-signature";
 boundary="==========876740887=========="
Errors-To: owner-nanog-outgoing@merit.edu


--==========876740887==========
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

--On Thursday, August 23, 2001 12:39:21 -0400 Jim Mercer <jim@reptiles.org> =

wrote:

> my suspicions and some things to look for:
>
> - boxes were comprimised using the buffer overflow in telnetd
> (speculation)

The CERT/CC is aware of some level of automated exploitation of
the recently described telnetd vulnerability. If folks have yet
to patch systems for that particular vulnerability, it would be
a good thing to spend time doing. We've seen it used to deploy
DDoS-capable tools, for example.

More info on the vulnerability at:

 http://www.kb.cert.org/vuls/id/745371

Kevin

--==========876740887==========
Content-Type: application/pgp-signature
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7hUBau/NTC+XTbEkRAlwTAKCC74n5cY4kD6MUZV+96+c9ANJMFwCfVjr+
VqY9x9ZMlYARMPbZsPGeeLc=
=GJ0H
-----END PGP SIGNATURE-----

--==========876740887==========--


home help back first fref pref prev next nref lref last post