On 5/27/05, Alexei Chetroi <[EMAIL PROTECTED]> wrote:
> On Thu, May 26, 2005 at 09:01:37PM -0400, Selva Nair wrote:
> > Date: Thu, 26 May 2005 21:01:37 -0400
> > From: Selva Nair <[EMAIL PROTECTED]>
> > Subject: Re: root compromise on debian woody
snip
> &g
On 5/26/05, Joey Hess <[EMAIL PROTECTED]> wrote:
> Selva Nair wrote:
> >Looking through evidence left behind (bash_history etc..) I have
> > figured out that
> > the privilege escalation was achived using an executable that the
> > attacker downloaded
>
On 5/26/05, Joey Hess <[EMAIL PROTECTED]> wrote:
> Selva Nair wrote:
> > I have taken the system off the net and am in the process of
> > re-installing but the existence
> > of such an easy to use and effective privilege escalation kit is
> > quite disturbing. As
works.
Although pretty well familiar with Linux and have been running servers
for several years,
this is the first time facing a root exploit, so I'm rather clueless
as to what to do.
Any advice would be highly appreciated.
Thanks,
Selva Nair
4 matches
Mail list logo