Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 21 May 2000 14:08:47 -0400
From:      "Crist J. Clark" <cjc@cc942873-a.ewndsr1.nj.home.com>
To:        freebsd-security@freebsd.org
Subject:   The procfs Hole in 2.2.8-STABLE?
Message-ID:  <20000521140847.G96573@cc942873-a.ewndsr1.nj.home.com>

next in thread | raw e-mail | index | archive | help
I just want to verify something before I cause myself some pain. From
the wording of FreeBSD-SA-00:01,

  ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:02.procfs.asc

Am I to take it that 2.2.8-STABLE would be vulnerable? The following
seems to imply it,

 "Unfortunately, throughout these three years it was still possible to
  abuse /proc/pid/mem in a similar, though more complicated fashion,
  which could lead to local root compromise."

Since the 2.2.x branch was the RELEASE and STABLE branch for a good
part of that three years.

It just occured to me recently that the UW IMAP vulnerability that
allows users to get a shell combined with a procfs hole would be a Bad
Thing on an old 2.2.8-STABLE mailserver I have. I'm not going to go
through the pain of upgrading the OS that machine except for security
reasons (it's been fine for two years, why fix what ain't broke).

Do I need to do upgrade it? Maybe I'll just umount /proc.
-- 
Crist J. Clark                           cjclark@home.com


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000521140847.G96573>