TIP: Click on subject to list as thread! ANSI
echo: tech
to: DAVID DRUMMOND
from: CHARLES ANGELICH
date: 2003-12-09 10:50:00
subject: Re: Knoppix

1237e11a6683
tech



Hello David - 

CA>> I was referring to the necessity to un-mount devices etc.
CA>> rather than the automated way that Windows (and other OS)
CA>> do it. 

DD> Try the automounter daemon. 

September 29, 1999 22:00 GMT                      Number J-071
______________________________________________________________
PROBLEM:       There is a buffer overflow vulnerability in the
               amd daemon that could allow remote users to
               execute arbitrary code as root.
PLATFORM:      Systems running amd, the Berkeley Automounter
               Daemon
DAMAGE:        If exploited, a remote intruder can cause a buffer
               overflow leading to a root compromise.
SOLUTION:      Apply available vendor patch.

>
>        ,                          ,
>      o/      Charles.Angelich      \o       ,
>       __o/
>     / >          USA, MI           < \   __\__
 

--- * ATP/16bit 2.31 * 
... DOS the Ghost in the Machine! http://www.undercoverdesign.com/dosghost/
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.