Date: Sun, 29 Jul 2001 13:40:26 -0400 (EDT) From: Adam <bsdx@looksharp.net> To: alexus <ml@db.nexgen.com> Cc: Chris Byrnes <chris@jeah.net>, <security@FreeBSD.ORG> Subject: Re: [PATCH] Re: FreeBSD remote root exploit ? Message-ID: <20010729134005.U45945-100000@turtle.looksharp.net> In-Reply-To: <005d01c1107a$b6f57a40$0d00a8c0@alexus>
next in thread | previous in thread | raw e-mail | index | archive | help
Looks to me like it was already compiled so it just installed it. Try make clean first On Thu, 19 Jul 2001, alexus wrote: >su-2.05# cd /usr/src/libexec/telnetd/ >su-2.05# make all install >install -c -s -o root -g wheel -m 555 telnetd /usr/libexec >install -c -o root -g wheel -m 444 telnetd.8.gz /usr/share/man/man8 >su-2.05# > >hmm that's it? seems like too short compilation .. is it supposed to be li= ke >this? > >----- Original Message ----- >From: "Chris Byrnes" <chris@jeah.net> >To: "alexus" <ml@db.nexgen.com> >Cc: <security@FreeBSD.ORG> >Sent: Thursday, July 19, 2001 1:39 PM >Subject: Re: [PATCH] Re: FreeBSD remote root exploit ? > > >root# cd /usr/src/libexec/telnetd ; make all install ; killall -HUP inetd > > >Chris Byrnes, Managing Member >JEAH Communications, LLC > >On Thu, 19 Jul 2001, alexus wrote: > >> uh. ok:) >> >> this part is done.. should i recompile telnetd now somehow? if so then >> how?:) >> >> ----- Original Message ----- >> From: "Pierre-Luc Lesp=E9rance" <silence@oksala.org> >> To: <security@FreeBSD.ORG> >> Sent: Thursday, July 19, 2001 1:28 PM >> Subject: Re: [PATCH] Re: FreeBSD remote root exploit ? >> >> >> > alexus wrote: >> > > >> > > could you also include some sort of instruction how to apply it? >> > > >> > > thanks in advance >> > > >> > > ----- Original Message ----- >> > > From: "Ruslan Ermilov" <ru@FreeBSD.ORG> >> > > To: "Przemyslaw Frasunek" <venglin@freebsd.lublin.pl> >> > > Cc: <security@FreeBSD.ORG> >> > > Sent: Thursday, July 19, 2001 1:14 PM >> > > Subject: [PATCH] Re: FreeBSD remote root exploit ? >> > > >> > > > On Thu, Jul 19, 2001 at 11:03:53AM +0200, Przemyslaw Frasunek wrot= e: >> > > > > > Posted to bugtraq is a notice about telnetd being remotely roo= t >> > > > > > exploitable. Does anyone know if it is true ? >> > > > > >> > > > > Yes, telnetd is vulnerable. >> > > > > >> > > > The patch is available at: >> > > > >> > > > http://people.FreeBSD.org/~ru/telnetd.patch >> > > > >> > > > >> > > > Cheers, >> > > > -- >> > > > Ruslan Ermilov Oracle Developer/DBA, >> > > > ru@sunbay.com Sunbay Software AG, >> > > > ru@FreeBSD.org FreeBSD committer, >> > > > +380.652.512.251 Simferopol, Ukraine >> > > > >> > > > http://www.FreeBSD.org The Power To Serve >> > > > http://www.oracle.com Enabling The Information Age >> > > > >> > > > To Unsubscribe: send mail to majordomo@FreeBSD.org >> > > > with "unsubscribe freebsd-security" in the body of the message >> > > > >> > > >> > > To Unsubscribe: send mail to majordomo@FreeBSD.org >> > > with "unsubscribe freebsd-security" in the body of the message >> > go to /usr/src/crypto/telnet/telnetd >> > and type >> > shell~# patch -p < /where/is/the/file.patch >> > >> > To Unsubscribe: send mail to majordomo@FreeBSD.org >> > with "unsubscribe freebsd-security" in the body of the message >> > >> >> >> To Unsubscribe: send mail to majordomo@FreeBSD.org >> with "unsubscribe freebsd-security" in the body of the message >> > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-security" in the body of the message > > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010729134005.U45945-100000>