From: | symack <symack@×××××.com> | ||
---|---|---|---|
To: | gentoo-user <gentoo-user@l.g.o> | ||
Subject: | Re: [gentoo-user] Ghost cyber threat | ||
Date: | Fri, 30 Jan 2015 17:19:08 | ||
Message-Id: | CAGWRaZYfSEWU5NuYNPBiF1yrzxrK+XpKMcoJiP3oWaaE2dXuSw@mail.gmail.com | ||
In Reply to: | Re: [gentoo-user] Ghost cyber threat by Andrew Savchenko |
1 | Hello Andrew, |
2 | |
3 | Thank you for your response. For example, Exim implements reverse lookup. |
4 | How is malicious activity used against it? Do they need telnet or ssh |
5 | access, |
6 | or buy some freak of nature can exploit the vulnerability in other ways? |
7 | |
8 | N |
9 | |
Subject | Author |
---|---|
Re: [gentoo-user] Ghost cyber threat | Andrew Savchenko <bircoph@g.o> |