Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 14 Dec 2000 17:10:57 +0000
From:      Frank van Vliet <karin@root66.org>
To:        freebsd-security@freebsd.org
Subject:   Re: Details of www.freebsd.org penetration
Message-ID:  <20001214171057.A43310@root66.org>
In-Reply-To: <00c401c0666c$1f63cff0$9207c00a@local>; from JHowie@msn.com on Fri, Dec 15, 2000 at 07:53:32AM -0000
References:  <20001214070649.A25429@citusc.usc.edu> <00c401c0666c$1f63cff0$9207c00a@local>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Fri, Dec 15, 2000 at 07:53:32AM -0000, John Howie wrote:
> Any chance you could let us know exactly what 'local root vulnerability' was
> exploited. As I recall it was originally stated that no weakness in FreeBSD
> itself had been leveraged. I appreciate that the hacker gained access to the
> system via CGI (and not a FreeBSD weakness) but once in he/she became root
> through some other means. Was this vulnerability a configuration issue or
> simply a known problem that had not been addressed?

Allthou we normaly only use weaknesses created by the server admins itself, 
like cgi scripts made by them and configurations, this time local root was
gained by a local root exploit which was an 'error' of freebsd itself. 
Advisory about it was promised to be send weeks ago, it is fixed in FreeBSD 4.2

Kris, this would be a nice timing for that advisory?

	Frank van Vliet alias {}
	Joost Pol alias nohican

	
-- 
RooT66: 	http://root66.student.utwente.nl
PGP Public Key:	http://root66.student.utwente.nl/frank.pub.pgp

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.1i

iQA/AwUBOjj/IOv9YnvRDibSEQKcUwCgtGPA5tbrbZUb3ELlejS1Au+QQToAn0qC
Ba9b7llF3q9lXdahRZbIYxWd
=Rsx+
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001214171057.A43310>