From owner-freebsd-questions@FreeBSD.ORG Fri Dec 11 15:48:04 2009 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id ED4811065670 for ; Fri, 11 Dec 2009 15:48:04 +0000 (UTC) (envelope-from subscriber+freebsd@markshroyer.com) Received: from markshroyer.com (markshroyer.com [206.251.36.32]) by mx1.freebsd.org (Postfix) with ESMTP id BCD2B8FC16 for ; Fri, 11 Dec 2009 15:48:04 +0000 (UTC) Received: from auth-client.mail.markshroyer.com (markshroyer.com [206.251.36.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "Mark Allen Shroyer", Issuer "Mark Shroyer Humans CA" (verified OK)) by markshroyer.com (Postfix) with ESMTPS id BD5C214091 for ; Fri, 11 Dec 2009 10:28:54 -0500 (EST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=markshroyer.com; s=default; t=1260545335; bh=mk5ohC/4JO78I0nwaQBCjylaXpHRWywjcDDCqip nBZ4=; h=Date:From:To:Subject:Message-ID:References:MIME-Version: Content-Type:In-Reply-To; b=v2GNpNPYIr/HcvspuMfeZwp455PmNhyOJSpukS VAAMdJfyH3IcD8SVJab1DuGdrtdJhhHoKcTTdWxVIZkkObAJxisuBNDeWwS75mqbnAo Yx5uRJiRibQncpNrgpFxZqpXCZ20LDP0EaS2btleYI22xWfbg7G703Rz4s2xL7SqVo= Date: Fri, 11 Dec 2009 10:28:46 -0500 From: Mark Shroyer To: freebsd-questions@freebsd.org Message-ID: <20091211152846.GA4372@markshroyer.com> Mail-Followup-To: freebsd-questions@freebsd.org References: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> <20091210095122.a164bf95.wmoran@potentialtech.com> <11167f520912102342y349ebf03tccf886da0ecf53e9@mail.gmail.com> <20091211093023.009125d9.freebsd@edvax.de> <4B2207A6.7070204@infracaninophile.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4B2207A6.7070204@infracaninophile.co.uk> User-Agent: Mutt/1.5.18 (2008-05-17) Subject: Re: Root exploit for FreeBSD X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Dec 2009 15:48:05 -0000 On Fri, Dec 11, 2009 at 08:49:42AM +0000, Matthew Seaman wrote: > I dunno. Haven't seen many MS-DOS exploits recently either... That's true, it would be difficult to find a local privilege escalation exploit in an operating system without the concept of limited user accounts :) -- Mark Shroyer http://markshroyer.com/contact/