edit: repost
Sorry all.
A site some of you may visit (though I doubt anyone will admit it) is gone for good.
Stileproject.com letter announcing that it has shut down
Apparently, they were hacked. Straight from the site:
the site was hacked at 11:00 this morning. i didn't have a backup, everything is gone. i quit. thanks for the 2 years. sorry it had to end this way.
here is a copy of the hack. if anyone knows who this guy is, let me know. hundreds of sites have been hit with this telnetd exploit, and i'm sure the FBI would love to know who this [censored] is.
System Administrators: READ THIS! While we run FreeBSD, and the advisory below is for FreeBSD, This problem also exists in BSDI, IRIX, Linux, NetBSD, OpenBSD, Solaris and more. Check with your vendor for a telnetd fix as soon as possible!
An overflowable buffer was found in the version of telnetd included with FreeBSD. Due to incorrect bounds checking of data buffered for output to the remote client, an attacker can cause the telnetd process to overflow the buffer and crash, or execute arbitrary code as the user running telnetd, usually root. A valid user account and password is not required to exploit this vulnerability, only the ability to connect to a telnetd server.
The telnetd service is enabled by default on all FreeBSD installations if the 'high' security setting is not selected at install-time. This vulnerability is known to be exploitable, and is being actively exploited in the wild.
Poor Stile. He ran such a... strange site.
-Shy
Sorry all.
A site some of you may visit (though I doubt anyone will admit it) is gone for good.
Stileproject.com letter announcing that it has shut down
Apparently, they were hacked. Straight from the site:
the site was hacked at 11:00 this morning. i didn't have a backup, everything is gone. i quit. thanks for the 2 years. sorry it had to end this way.
here is a copy of the hack. if anyone knows who this guy is, let me know. hundreds of sites have been hit with this telnetd exploit, and i'm sure the FBI would love to know who this [censored] is.
System Administrators: READ THIS! While we run FreeBSD, and the advisory below is for FreeBSD, This problem also exists in BSDI, IRIX, Linux, NetBSD, OpenBSD, Solaris and more. Check with your vendor for a telnetd fix as soon as possible!
An overflowable buffer was found in the version of telnetd included with FreeBSD. Due to incorrect bounds checking of data buffered for output to the remote client, an attacker can cause the telnetd process to overflow the buffer and crash, or execute arbitrary code as the user running telnetd, usually root. A valid user account and password is not required to exploit this vulnerability, only the ability to connect to a telnetd server.
The telnetd service is enabled by default on all FreeBSD installations if the 'high' security setting is not selected at install-time. This vulnerability is known to be exploitable, and is being actively exploited in the wild.
Poor Stile. He ran such a... strange site.
-Shy