========= SCRAPER REMOVED AN EMBEDDED LINK HERE ===========
url was:"http://forum.mepiscommunity.org/viewtopic.php?f=73&t=36253&p=340447#p340447"
linktext was:"http://forum.mepiscommunity.org/viewtop ... 47#p340447"
====================================
Last week it was reported that a bug in the Linux kernel could potentially allow users on a Linux-based system to gain privileges and run malicious code. The flaw was introduced during the development of the 2.6.31 kernel and affects kernels up to version 3.14.3. Dan Rosenberg, a security researcher with Azimuth Security opined that a bug like this one, which can affect a wide range of architectures and distributions, is rare."A bug this serious only comes out once every couple years," he said. Distributions have reacted quickly. The Ubuntu developers have released a patch, as has the Debian project. Red Hat has reported they are looking into the issue, but believe the exploit may not affect Red Hat Enterprise Linux.
Can you tell me which servers home user must stop to run ? What I must do for protect my PC from hack?nmap -sTU -O localhost
Starting Nmap 6.40 (
========= SCRAPER REMOVED AN EMBEDDED LINK HERE ===========
url was:"http://nmap.org"
linktext was:"http://nmap.org"
====================================
) at 2014-05-21 18:46 MSK
Nmap scan report for localhost (127.0.0.1)
Host is up (0.00036s latency).
Other addresses for localhost (not scanned): 127.0.0.1
Not shown: 1989 closed ports
PORT STATE SERVICE
22/tcp open ssh
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
631/tcp open ipp
68/udp open|filtered dhcpc
111/udp open rpcbind
123/udp open ntp
137/udp open netbios-ns
138/udp open|filtered netbios-dgm
631/udp open|filtered ipp
No exact OS matches for host (If you know what OS is running on it, see
========= SCRAPER REMOVED AN EMBEDDED LINK HERE ===========
url was:"http://nmap.org/submit/"
linktext was:"http://nmap.org/submit/"
====================================
).
TCP/IP fingerprint:
OS:SCAN(V=6.40%E=4%D=5/21%OT=22%CT=1%CU=2%PV=N%DS=0%DC=L%G=Y%TM=537CBC85%P=
OS:i686-pc-linux-gnu)SEQ(SP=104%GCD=1%ISR=109%TI=Z%CI=I%II=I%TS=8)OPS(O1=MF
OS:FD7ST11NW6%O2=MFFD7ST11NW6%O3=MFFD7NNT11NW6%O4=MFFD7ST11NW6%O5=MFFD7ST11
OS:NW6%O6=MFFD7ST11)WIN(W1=AAAA%W2=AAAA%W3=AAAA%W4=AAAA%W5=AAAA%W6=AAAA)ECN
OS:(R=Y%DF=Y%T=40%W=AAAA%O=MFFD7NNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=
OS:AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(
OS:R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%
OS:F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N
OS:%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%C
OS:D=S)
Network Distance: 0 hops
OS detection performed. Please report any incorrect results at
========= SCRAPER REMOVED AN EMBEDDED LINK HERE ===========
url was:"http://nmap.org/submit/"
linktext was:"http://nmap.org/submit/"
====================================
.
Nmap done: 1 IP address (1 host up) scanned in 37.07 seconds