[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Is there a FAM(file alteration monitor) exploit in the wild?

On Mon, Dec 08, 2003 at 11:02:49AM +0100, Jean-Francois Dive wrote:
> why do you run that kind of service on a publicly reachable  address ? 

Well, it wasn't by choice.  It came with some K-apps that were
installed.  But that isn't the point.  It is pretty common.  The fact
that there might be an exploit involving fam and probably the 2.4 kernel
exploit isn't getting the attention.  The daemon itself doesn't appear
to have any security surrounding it.


Attachment: pgpsDAvk7xPvD.pgp
Description: PGP signature

Reply to: