Date: Mon, 12 Jul 1999 21:26:21 +0930 (CST) From: Mark Newton <newton@atdot.dotat.org> To: mike@sentex.net (Mike Tancsa) Cc: security@FreeBSD.ORG, stable@FreeBSD.ORG Subject: Re: 3.x backdoor rootshell security hole Message-ID: <199907121156.VAA05155@atdot.dotat.org> In-Reply-To: <4.1.19990712080116.053e4430@granite.sentex.ca> from "Mike Tancsa" at Jul 12, 99 08:05:03 am
next in thread | previous in thread | raw e-mail | index | archive | help
Mike Tancsa wrote:
> Has anyone looked at the articled below ? Here is a quote,
> "The following module was a nice idea I had when playing around with the
> proc structure. Load this module, and you can 'SU' without a password.
If you have enough privileges to load a module, you have enough
privileges to su without a password already (by creating an suid
shell, for example)
- mark
--------------------------------------------------------------------
I tried an internal modem, newton@atdot.dotat.org
but it hurt when I walked. Mark Newton
----- Voice: +61-4-1620-2223 ------------- Fax: +61-8-82231777 -----
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199907121156.VAA05155>
