From owner-freebsd-questions Thu Oct 19 8:30:50 2000 Delivered-To: freebsd-questions@freebsd.org Received: from smtp.tznet.com (smtp.tznet.com [206.31.5.6]) by hub.freebsd.org (Postfix) with ESMTP id 963A837B4C5 for ; Thu, 19 Oct 2000 08:30:35 -0700 (PDT) Received: from darkangel.gothic.com ([205.216.111.179]) by smtp.tznet.com with ESMTP (IPAD 2.52/64) id 3639600; Thu, 19 Oct 2000 10:30:32 -0500 Received: by darkangel.gothic.com (Postfix, from userid 1001) id 7E8F2A7; Thu, 19 Oct 2000 10:37:54 -0500 (CDT) Date: Thu, 19 Oct 2000 10:37:54 -0500 From: Michael Urban To: freebsd-questions@freebsd.org Subject: su root exploit? Message-ID: <20001019103754.A667@tznet.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Does this particular root explit affect su on FreeBSD? The article says it affects all versions of su. I built and tried to use the code they included on my system, but I couldn't get anything to happen. Does anyone know if FreeBSD is vunerable? Here is the full URL: http://www.securiteam.com/exploits/_bin_su_local_libc_exploit_yielding_a_root_shell.html To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message