From owner-freebsd-hackers Wed Jun 30 7:21:52 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from titan.metropolitan.at (mail.metropolitan.at [195.212.98.131]) by hub.freebsd.org (Postfix) with ESMTP id B575F15482; Wed, 30 Jun 1999 07:21:27 -0700 (PDT) (envelope-from mladavac@metropolitan.at) Received: by TITAN with Internet Mail Service (5.0.1458.49) id ; Wed, 30 Jun 1999 16:24:04 +0200 Message-ID: <55586E7391ACD211B9730000C11002761796C5@r-lmh-wi-100.corpnet.at> From: Ladavac Marino To: 'Bill Fumerola' , David O'Brien Cc: Bill Fumerola , hackers@FreeBSD.ORG Subject: RE: tcpdump(1) additions. Date: Wed, 30 Jun 1999 16:18:10 +0200 X-Priority: 3 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.0.1458.49) Content-Type: text/plain Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG > -----Original Message----- > From: Bill Fumerola [SMTP:billf@chc-chimes.com] > Sent: Wednesday, June 30, 1999 11:54 AM > To: David O'Brien > Cc: Bill Fumerola; hackers@FreeBSD.ORG > Subject: Re: tcpdump(1) additions. > > On Wed, 30 Jun 1999, David O'Brien wrote: > > > Hmmm.. but a non-superuser never sees any of those malicious packets, > and > the program is not installed suid, so how would that happen? [ML] Simple. One of these bad packets makes the currently executing copy of tcpdump (invoked by superuser) install a backdoor on the system. Probably with root privileges, too. An actual exploit thereof is probably not that simple, but possible nevertheless. /Marino > - bill fumerola - billf@chc-chimes.com - BF1560 - computer horizons > corp - > - ph:(800) 252-2421 - bfumerol@computerhorizons.com - > billf@FreeBSD.org - > > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-hackers" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message