From owner-freebsd-security Mon Jul 28 16:26:34 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id QAA11974 for security-outgoing; Mon, 28 Jul 1997 16:26:34 -0700 (PDT) Received: from mail.MCESTATE.COM (vince@mail.MCESTATE.COM [207.211.200.50]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id QAA11965 for ; Mon, 28 Jul 1997 16:26:31 -0700 (PDT) Received: from localhost (vince@localhost) by mail.MCESTATE.COM (8.8.5/8.8.5) with SMTP id QAA06932; Mon, 28 Jul 1997 16:25:31 -0700 (PDT) Date: Mon, 28 Jul 1997 16:25:30 -0700 (PDT) From: Vincent Poy To: "Jonathan A. Zdziarski" cc: "[Mario1-]" , JbHunt , Robert Watson , Tomasz Dudziak , security@FreeBSD.ORG Subject: Re: security hole in FreeBSD In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Mon, 28 Jul 1997, Jonathan A. Zdziarski wrote: =)As long as httpd and sessiond are owned by something other than what cgi =)scripts run as you're safe, but if they are both nobody, you can replace =)the binary...We had it happen to us once with v1.2 this is how I know. Hmmm, what should the owners be for those files? Since the apache cgi scripts are owned by root as far as I can remember. Cheers, Vince - vince@MCESTATE.COM - vince@GAIANET.NET ________ __ ____ Unix Networking Operations - FreeBSD-Real Unix for Free / / / / | / |[__ ] GaiaNet Corporation - M & C Estate / / / / | / | __] ] Beverly Hills, California USA 90210 / / / / / |/ / | __] ] HongKong Stars/Gravis UltraSound Mailing Lists Admin /_/_/_/_/|___/|_|[____]