Bugtraq mailing list archives
Re: Standard & Poors security nightmare
From: jmknoble () PINT-STOWP CX (Jim Knoble)
Date: Thu, 18 May 2000 16:27:34 -0400
Circa 2000-May-17 12:44:01 -0700 schrieb Stephen Friedl: : Standard & Poor's ComStock division sells a MultiCSP system that : provides realtime stock quotes and news, and [...] These machines are : an unmitigated *disaster* for security, and it's not often I can use : "unmitigated" so literally. [...] : 6) Install and use ipchains on *both* interfaces to drastically reduce what : this machine can do. [....] Kernel 2.0.35 is likely to use ipfwadm, which is likely to already be installed on a Red Hat Linux 5.1 system. Anyone know of a reason not to use ipfwadm? -- jim knoble | jmknoble () jmknoble cx | http://www.jmknoble.cx/
Current thread:
- Standard & Poors security nightmare Stephen Friedl (May 17)
- Re: Standard & Poors security nightmare Jim Knoble (May 18)
- Re: Standard & Poors security nightmare Richard Seaman, Jr. (May 20)
- Re: Standard & Poors security nightmare Richard Seaman, Jr. (May 21)
- Re: Standard & Poors security nightmare Crispin Cowan (May 20)
- "gdm" remote hole Chris Evans (May 21)
- Re: "gdm" remote hole Katherine M. Moussouris (May 22)
- fdmount buffer overflow Arend-Jan Wijtzes (May 22)
- Re: fdmount buffer overflow Greg Olszewski (May 22)
- About VNC Patrick Oonk (May 24)
- Re: fdmount buffer overflow Tomasz Grabowski (May 24)
- Re: fdmount buffer overflow Matt Wilson (May 24)
- Re: fdmount buffer overflow Greg Olszewski (May 22)
(Thread continues...)