| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Knoppix |
1237e11a6683
tech
Hello David -
CA>> I was referring to the necessity to un-mount devices etc.
CA>> rather than the automated way that Windows (and other OS)
CA>> do it.
DD> Try the automounter daemon.
September 29, 1999 22:00 GMT Number J-071
______________________________________________________________
PROBLEM: There is a buffer overflow vulnerability in the
amd daemon that could allow remote users to
execute arbitrary code as root.
PLATFORM: Systems running amd, the Berkeley Automounter
Daemon
DAMAGE: If exploited, a remote intruder can cause a buffer
overflow leading to a root compromise.
SOLUTION: Apply available vendor patch.
>
> , ,
> o/ Charles.Angelich \o ,
> __o/
> / > USA, MI < \ __\__
--- * ATP/16bit 2.31 *
... DOS the Ghost in the Machine! http://www.undercoverdesign.com/dosghost/
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)SEEN-BY: 633/267 270 @PATH: 123/140 500 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.