Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 01 Jul 2005 11:50:48 -0300
From:      Patrick Tracanelli <eksffa@freebsdbrasil.com.br>
To:        "Argelo, Jorn" <jorn_argelo@epson-europe.com>
Cc:        stable@freebsd.org
Subject:   Re: Possible exploit in 5.4-STABLE
Message-ID:  <42C55848.2060404@freebsdbrasil.com.br>
In-Reply-To: <42C54F34.3070003@epson-europe.com>
References:  <42C54F34.3070003@epson-europe.com>

next in thread | previous in thread | raw e-mail | index | archive | help
[skip]
> to attach the binary, but I'll do it anyway because I don't have 
> anything else but that and a readme file. It didn't seem to work (out of 
> the box) with 5.4-RELEASE though.
> 
> This is a translation from babelfish:
> 
> Plain replacement of "standard" su for FreeBSD. It makes it possible to 
> become any user (inc. root) with the introduction of any password. For 
> this necessary to neglect su with the option "-!". with the use of this 
> option does not conduct ravine- files. Was tested on FreeBSD 5.4-STABLE.
> 
> My apologies if I am sending in something completely useless and not 
> important, but I figured it wouldn't hurt just to make sure.
> 
> Cheers,

The attached file needs to be setuid to root, so, someone needed to have 
increased privileges before, in order to install this prg. In this case 
a one-line C program w/ root setuid would do the same job.

-- 
Patrick Tracanelli
patrick @ freebsdbrasil.com.br
"Long live Hanin Elias, Kim Deal!"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?42C55848.2060404>