TIP: Click on subject to list as thread! ANSI
echo: tech
to: CHARLES ANGELICH
from: David Drummond
date: 2003-12-11 07:13:22
subject: Re: Knoppix

Al salaam a'alaykum CHARLES

09 Dec 03 10:50, CHARLES ANGELICH wrote to DAVID DRUMMOND:

 CA>>> I was referring to the necessity to un-mount devices etc.
 CA>>> rather than the automated way that Windows (and other OS)
 CA>>> do it. 

 DD>> Try the automounter daemon. 

 CA> September 29, 1999 22:00 GMT                      Number J-071
 CA> ______________________________________________________________
 CA> PROBLEM:       There is a buffer overflow vulnerability in the
 CA>                amd daemon that could allow remote users to
 CA>                execute arbitrary code as root.
 CA> PLATFORM:      Systems running amd, the Berkeley Automounter
 CA>                Daemon
 CA> DAMAGE:        If exploited, a remote intruder can cause a buffer
 CA>                overflow leading to a root compromise.
 CA> SOLUTION:      Apply available vendor patch.

Get and install the later version.

Regards,
David

--- Msged/LNX TE 06 (pre)
* Origin: Linux on a 386? Easy! (3:640/305)
SEEN-BY: 633/267 270
@PATH: 640/305 954 774/605 123/500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.