Bugtraq mailing list archives
Re: Router filtering not enough! (Was: Re: CERT advisory )
From: anonymous () some lame netcom not site (anonymous () some lame netcom not site)
Date: Mon, 30 Jan 1995 19:58:47 -0800
Hello, I'm taking advantage of netcom's semi-anonymous remailer to call on assistance from the bugtraq community. The machine is a sparc 5, running Solaris at patch level Generic_101945-10. TCP wrappers running on standard services, most rcp stuff wide open. BTW this is solaris 2.4. When I run top or rsh into this or other machines, I get something like: top: cannot open /dev/kmem: Permission denied kvm_open: Permission denied I'm worried I've been screwed. Permissions on /dev/kmem (Which points to /devices/pseudo/mm@0:kmem) are: crw-r----- 1 root sys 13, 1 Oct 25 11:33 mm@0:kmem crw-r----- 1 root sys 13, 0 Oct 25 11:33 mm@0:mem This just now started happening. Is anyone aware of any thing "malicious" or "fingerprintish" that could have caused this? Thank you. Please respond via this list, if you know of a bug or hole which could be thus exploited, or sloppily left.
Current thread:
- Re: Chances of guessing?, (continued)
- Re: Chances of guessing? Timothy Newsham (Jan 27)
- Re: Router filtering not enough! (Was: Re: CERT advisory ) Darren Reed (Jan 26)
- Re: Router filtering not enough! (Was: Re: CERT advisory ) Pete Shipley (Jan 26)
- old post on securing a sunos 4.1.* box joshua geller (Jan 30)
- Re: old post on securing a sunos 4.1.* box pluvius (Jan 30)
- Re: Router filtering not enough! (Was: Re: CERT advisory ) smb () research att com (Jan 26)
- Re: Re: Router filtering not enough! (Was: Re: CERT advisory ) Pete Hartman (Jan 26)
- Re: Re: Router filtering not enough! (Was: Re: CERT advisory ) Jonathan M. Bresler (Jan 27)
- Re: Router filtering not enough! (Was: Re: CERT advisory ) Jonathan M. Bresler (Jan 27)
- Re: Router filtering not enough! (Was: Re: CERT advisory ) smb () research att com (Jan 27)
- Re: Router filtering not enough! (Was: Re: CERT advisory ) anonymous () some lame netcom not site (Jan 30)
- list leadership Robert M. Haas (Jan 31)
- Anonymous mailings Adam Shostack (Jan 31)
- list leadership Robert M. Haas (Jan 31)