From owner-freebsd-security Wed Jun 26 15:00:55 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id PAA19758 for security-outgoing; Wed, 26 Jun 1996 15:00:55 -0700 (PDT) Received: from gvr.win.tue.nl (root@gvr.win.tue.nl [131.155.210.19]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id PAA19727 for ; Wed, 26 Jun 1996 15:00:46 -0700 (PDT) Received: by gvr.win.tue.nl (8.6.12/1.53) id AAA24286; Thu, 27 Jun 1996 00:00:15 +0200 From: guido@gvr.win.tue.nl (Guido van Rooij) Message-Id: <199606262200.AAA24286@gvr.win.tue.nl> Subject: Re: CERT Advisory CA-96.12 - Vulnerability in suidperl (fwd) To: taob@io.org (Brian Tao) Date: Thu, 27 Jun 1996 00:00:14 +0200 (MET DST) Cc: freebsd-security@freebsd.org In-Reply-To: from Brian Tao at "Jun 26, 96 02:38:13 pm" X-Mailer: ELM [version 2.4ME+ PL17 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Brian Tao wrote: [There is text before PGP section.] > I believe this applies to perl4 as shipped with all versions of > FreeBSD, as well as the perl5 packages/ports. Does anyone know what > the actual vulnerability is? We know. This bug was first reported by Paul Traina to CERT. Of course we're not going to get into details. -Guido