Date: Thu, 11 Jul 1996 23:59:17 -0400 (EDT) From: Brian Tao <taob@io.org> To: Dan Polivy <danp@carebase3.jri.org> Cc: freebsd-security@FreeBSD.ORG Subject: Re: is FreeBSD's rdist vulnerable? Message-ID: <Pine.NEB.3.92.960711235818.29155E-100000@zap.io.org> In-Reply-To: <Pine.BSF.3.91.960703191714.1090A-100000@carebase3.jri.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 3 Jul 1996, Dan Polivy wrote: > > Has anyone read 8lgm's rdist advisory and attempted to see whether or not > FreeBSD's rdist is vulnerable? I use rdist to update various files here, > and so I suppose getting id of the setuid bit would break it? Thanks... It is indeed vulnerable. I've mailed security-officer@freebsd.org the exploit so someone can fix it right away. 2.1.0R and all the 2.2 snapshots are vulnerable. I haven't tried any of the 2.1.5 releases. -- Brian Tao (BT300, taob@io.org, taob@ican.net) Senior Systems and Network Administrator, Internet Canada Corp. "Though this be madness, yet there is method in't"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.92.960711235818.29155E-100000>