Gentoo Archives: gentoo-user

From: symack <symack@×××××.com>
To: gentoo-user <gentoo-user@l.g.o>
Subject: Re: [gentoo-user] Ghost cyber threat
Date: Fri, 30 Jan 2015 17:19:08
Message-Id: CAGWRaZYfSEWU5NuYNPBiF1yrzxrK+XpKMcoJiP3oWaaE2dXuSw@mail.gmail.com
In Reply to: Re: [gentoo-user] Ghost cyber threat by Andrew Savchenko
1 Hello Andrew,
2
3 Thank you for your response. For example, Exim implements reverse lookup.
4 How is malicious activity used against it? Do they need telnet or ssh
5 access,
6 or buy some freak of nature can exploit the vulnerability in other ways?
7
8 N
9

Replies

Subject Author
Re: [gentoo-user] Ghost cyber threat Andrew Savchenko <bircoph@g.o>