Security Incidents mailing list archives
Re: AMDROCKS
From: mattc () GUARDED NET (Matthew F. Caldwell)
Date: Fri, 26 May 2000 09:46:22 -0400
ADMROCKS is usually a bind daemon buffer overflow exploit. basicly someone has root access to your system more than likely. Time to reload the operating system. Matthew F. Caldwell, CISSP - Senior Consultant -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Guarded.Net - An Information Security Company connect(); to the future of secure computing! Email: matt.caldwell () guarded net -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- http://www.guarded.net --------------------------------------------------------------------------- This e-mail may contain proprietary commercial information and is intended for the addressed recipient(s) only. If you are not an addressed recipient of this e-mail and have received it in error, you must delete it. You may not forward or disseminate information contained in this e-mail without permission from Guarded.Net. Questions? Contact legal () guarded net --------------------------------------------------------------------------- On Thu, 25 May 2000, Jim Williams wrote:
Hi, I have a Cobalt RaQ3 that some jerk messed up with AMDROCKS. Can anyone tell me about it? Has Cobalt done anything about this security weakness? Thanks, Jim
Current thread:
- weird scan pattern, (continued)
- weird scan pattern Joe H (May 28)
- Re: weird scan pattern Russell Fulton (May 29)
- IDS: Scan of the week Lance Spitzner (May 30)
- 5 scans of 12345 in a couple of hours. AUSCERT#36349 Russell Fulton (May 31)
- Taiwan server compromise Claudiu Costin (May 26)
- Re: Taiwan server compromise Vortex (May 26)
- port 44767 activity Nathan Fain (May 28)
- Re: AMDROCKS Alejandro (May 26)
- Re: AMDROCKS J. S. Townsley (May 26)
- Re: AMDROCKS Lance Spitzner (May 26)
- Re: AMDROCKS Matthew F. Caldwell (May 26)
- CERT's Handbook for Computer Security Incident Response Teams (CSIRTs) Elias Levy (May 26)