| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Knoppix |
1237e12b73d7 tech Hello David - CA>>>> I was referring to the necessity to un-mount devices CA>>>> etc. rather than the automated way that Windows (and CA>>>> other OS) do it. DD>>> Try the automounter daemon. CA>> September 29, 1999 22:00 GMT Number J-071 CA>> ______________________________________________________________ CA>> PROBLEM: There is a buffer overflow vulnerability in the CA>> amd daemon that could allow remote users to execute CA>> arbitrary code as root. PLATFORM: Systems running amd, the CA>> Berkeley Automounter Daemon DAMAGE: If exploited, a remote CA>> intruder can cause a buffer overflow leading to a root CA>> compromise. SOLUTION: Apply available vendor patch. DD> Get and install the later version. I thought of that but this is one problem with websites. They don't get back to update information and just leave these old pages out there floating around. :-\ There is little to no 'followup' even at SourceForge and others where you might expect links to updated information. :-\ > > , , > o/ Charles.Angelich \o , > __o/ > / > USA, MI < \ __\__ --- * ATP/16bit 2.31 * ... DOS the Ghost in the Machine! http://www.undercoverdesign.com/dosghost/* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140) SEEN-BY: 633/267 270 @PATH: 123/140 500 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.