Date: Mon, 24 Jun 1996 13:19:26 -0700 (PDT) From: Veggy Vinny <richardc@CSUA.Berkeley.EDU> To: Mark Murray <mark@grumble.grondar.za> Cc: Wilko Bulte <wilko@yedi.iaf.nl>, "Jordan K. Hubbard" <jkh@time.cdrom.com>, guido@gvr.win.tue.nl, hackers@freebsd.org, security@freebsd.org, ache@freebsd.org Subject: Re: I need help on this one - please help me track this guy down! Message-ID: <Pine.PTX.3.91.960624131812.14727f-100000@soda.CSUA.Berkeley.EDU> In-Reply-To: <199606242013.WAA06237@grumble.grondar.za>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 24 Jun 1996, Mark Murray wrote: > Veggy Vinny wrote: > > Speaking about security, we are running a FreeBSD box and there > > is a guy that has this program that can get root shell as long as he has > > any account, can someone look into this and find out how he does it? > > Take claims like this with a pinch of salt. ;-) I know but I tried it and it does let me run vipw ;-) > What is the program? If we know how it works, we can fix any secuity hole > it may be exploiting. Hmmm, the program is called root, no sources.. it's just a 278k binary... Cheers, -Vince- richardc@CSUA.Berkeley.EDU - vince@COSC.GOV - vince@cygnus.sy.yale.edu GUS Mailing Lists Admin - http://www.COSC.GOV/~vince UC Berkeley AstroPhysics (B.S.) - Electrical Engineering (Honorary B.S.) Chabot Observatory & Science Center - Oakland, California USA Computing Networking Operations - Advisory Council Member Running FreeBSD - Real UN*X for Free! Linda Wong/Vivian Chow/Hacken Lee/Danny Chan/Priscilla Chan Fan Club Mailing Lists Admin 1996 Estoril Blue BMW ///M3 - BMW CCA Member Golden Gate Chapter
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.PTX.3.91.960624131812.14727f-100000>