From owner-freebsd-security Mon Dec 16 16:33:20 1996 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id QAA19039 for security-outgoing; Mon, 16 Dec 1996 16:33:20 -0800 (PST) Received: from roundtable.cif.rochester.edu (roundtable.cif.rochester.edu [128.151.220.14]) by freefall.freebsd.org (8.8.4/8.8.4) with ESMTP id QAA19032 for ; Mon, 16 Dec 1996 16:33:17 -0800 (PST) Received: (from sadmin@localhost) by roundtable.cif.rochester.edu (8.8.3/8.8.3) id TAA02446 for freebsd-security@freebsd.org; Mon, 16 Dec 1996 19:32:50 -0500 (EST) From: Security Administrator Message-Id: <199612170032.TAA02446@roundtable.cif.rochester.edu> Subject: crontab exploit To: freebsd-security@freebsd.org (FreeBSD Security) Date: Mon, 16 Dec 1996 19:32:50 -0500 (EST) X-Mailer: ELM [version 2.4 PL25] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk 12-16-96 I apologize for coming into this discussion just as it seems to be ending, but I was wondering if someone could email me the exploit to which everyone is referring in their letters. I just got onto the freebsd-security mailing list, and I think I missed the original exploit posting by a day or so. Thanks, Josh Pincus. -- System Security Administrator Computer Interest Floor University of Rochester Rochester, NY 14627 sadmin@roundtable.cif.rochester.edu