From owner-freebsd-security Mon Jul 28 16:20:09 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id QAA11389 for security-outgoing; Mon, 28 Jul 1997 16:20:09 -0700 (PDT) Received: from mail.MCESTATE.COM (vince@mail.MCESTATE.COM [207.211.200.50]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id QAA11321 for ; Mon, 28 Jul 1997 16:20:01 -0700 (PDT) Received: from localhost (vince@localhost) by mail.MCESTATE.COM (8.8.5/8.8.5) with SMTP id QAA06876; Mon, 28 Jul 1997 16:19:34 -0700 (PDT) Date: Mon, 28 Jul 1997 16:19:34 -0700 (PDT) From: Vincent Poy To: "Jonathan A. Zdziarski" cc: Nate Williams , Robert Watson , Tomasz Dudziak , security@freebsd.org, "[Mario1-]" , JbHunt Subject: Re: security hole in FreeBSD In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Mon, 28 Jul 1997, Jonathan A. Zdziarski wrote: =)httpd and sessiond initially are run as root, before they spawn off into =)separate processes. If you replace httpd and sessiond with your own code, =)so that before it changes its uid and forks, you will get a root shell That's true too since even if you kill the first httpd, the other processes don't die. Cheers, Vince - vince@MCESTATE.COM - vince@GAIANET.NET ________ __ ____ Unix Networking Operations - FreeBSD-Real Unix for Free / / / / | / |[__ ] GaiaNet Corporation - M & C Estate / / / / | / | __] ] Beverly Hills, California USA 90210 / / / / / |/ / | __] ] HongKong Stars/Gravis UltraSound Mailing Lists Admin /_/_/_/_/|___/|_|[____]