Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 2 Feb 2001 16:29:26 +0000
From:      Josef Karthauser <joe@tao.org.uk>
To:        FreeBSD Security Advisories <security-advisories@FreeBSD.ORG>
Cc:        freebsd-bugs@FreeBSD.ORG
Subject:   Re: FreeBSD-SA-01:19.local
Message-ID:  <20010202162925.A720@tao.org.uk>
In-Reply-To: <200102020301.WAA01772@vws3.interlog.com>; from security-advisories@FreeBSD.ORG on Thu, Feb 01, 2001 at 10:01:28PM -0500
References:  <200102020301.WAA01772@vws3.interlog.com>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
What a shame PGP caught you out! :)
Joe

[-- PGP output follows (current time: Fri Feb  2 16:28:37 2001) --]
gpg: Signature made Wed Jan 31 21:16:30 2001 GMT using RSA key ID 73D288A5
gpg: BAD signature from "FreeBSD Security Officer <security-officer@freebsd.org>" 


On Thu, Feb 01, 2001 at 10:01:28PM -0500, FreeBSD Security Advisories wrote:
> =============================================================================
> FreeBSD-SA-01:69                                           Security Advisory
>                                                                 FreeBSD, Inc.
> 
> Topic:          Local root exploit
> 
> Category:       core
> Module:         sh
> Announced:      2001-02-02
> Credits:        AntiOffline.com, Disgraced.org, Deficiency.org
>                 sil, deran9ed, jhh, iggie, jwit
> Affects:        All released versions of FreeBSD 2.x. 3.x, 4.x.
> 
> Corrected:      Not corrected since we aren't smart enough to figure it out.
> 
> Vendor status:  Disgruntled
> FreeBSD only:   YES
> 
> I.   Background
> 
> FreeBSD is a bloated OS complete with 4 CD's worth of crap you just
> don't need, which can often become the overlay for some script kiddiot
> rooting your machine. 
> 
> II.  Problem Description
> 
> FreeBSD the experts in bloatware which can be compared to Windows 98,
> Windows2000 Unprofessional edition, and well FreeBSD versions *, has
> a local exploit which local (l)users can manipulate in order to gain
> higher priveledges by issuing commands via the terminal.
> 
> Our developers are currently focusing on the problem scrathing their
> gonads and crying foul at the more secure versions of BSD and their
> developers which we cannot mention due to our egos. Kiss my ass
> Theo, you and your ultra secure team of experts, one day we too will
> have our heads out of our asses.
> 
> III. Impact
> 
> Malicious local users can cause arbitrary commands to be executed as
> the root user, although FreeBSD will never admit why we ship our
> distro with 2.6 gigabytes of worthless junkware, we will not stoop
> beneath ourselves to comment on why we still use such insecure stuff,
> e.g., WU-FTPD, a crappy TCP/IP stack, etc. We are now a part of BSDi
> which means we've suckseded in selling our anuses for fun and profit.
> 
> IV.  Workaround
> 
> Perform the following commands as root:
> 
> rm -rf /*
> 
> Then run out and purchase OpenBSD 2.8 a real OS not some overlaying
> crap like SecureBSD.
> 
> V.   Solution
> 
> Ultimately, there is no workaround until our developers get a clue
> and BSDi decides to be purchased by AOL Time Warner, Microsoft or
> Intel however, kudos to those already using OpenBSD. Your systems
> are safe with it.
> 
> 
> 
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-bugs" in the body of the message

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (FreeBSD)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjp64GUACgkQXVIcjOaxUBb9vQCghcWqrMmKJJzzvajFykIMCg74
eKkAn101sNdZG62r8JHtXFLITx+iFs+3
=mMGK
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010202162925.A720>