Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 Jul 2001 13:46:17 -0400
From:      "alexus" <ml@db.nexgen.com>
To:        "Chris Byrnes" <chris@jeah.net>
Cc:        <security@FreeBSD.ORG>
Subject:   Re: [PATCH] Re: FreeBSD remote root exploit ?
Message-ID:  <005d01c1107a$b6f57a40$0d00a8c0@alexus>
References:  <20010719123906.D71473-100000@awww.jeah.net>

next in thread | previous in thread | raw e-mail | index | archive | help
su-2.05# cd /usr/src/libexec/telnetd/
su-2.05# make all install
install -c -s -o root -g wheel -m 555   telnetd /usr/libexec
install -c -o root -g wheel -m 444 telnetd.8.gz  /usr/share/man/man8
su-2.05#

hmm that's it? seems like too short compilation .. is it supposed to be like
this?

----- Original Message -----
From: "Chris Byrnes" <chris@jeah.net>
To: "alexus" <ml@db.nexgen.com>
Cc: <security@FreeBSD.ORG>
Sent: Thursday, July 19, 2001 1:39 PM
Subject: Re: [PATCH] Re: FreeBSD remote root exploit ?


root# cd /usr/src/libexec/telnetd ; make all install ; killall -HUP inetd


Chris Byrnes, Managing Member
JEAH Communications, LLC

On Thu, 19 Jul 2001, alexus wrote:

> uh. ok:)
>
> this part is done.. should i recompile telnetd now somehow? if so then
> how?:)
>
> ----- Original Message -----
> From: "Pierre-Luc Lespérance" <silence@oksala.org>
> To: <security@FreeBSD.ORG>
> Sent: Thursday, July 19, 2001 1:28 PM
> Subject: Re: [PATCH] Re: FreeBSD remote root exploit ?
>
>
> > alexus wrote:
> > >
> > > could you also include some sort of instruction how to apply it?
> > >
> > > thanks in advance
> > >
> > > ----- Original Message -----
> > > From: "Ruslan Ermilov" <ru@FreeBSD.ORG>
> > > To: "Przemyslaw Frasunek" <venglin@freebsd.lublin.pl>
> > > Cc: <security@FreeBSD.ORG>
> > > Sent: Thursday, July 19, 2001 1:14 PM
> > > Subject: [PATCH] Re: FreeBSD remote root exploit ?
> > >
> > > > On Thu, Jul 19, 2001 at 11:03:53AM +0200, Przemyslaw Frasunek wrote:
> > > > > > Posted to bugtraq is a notice about telnetd being remotely root
> > > > > > exploitable. Does anyone know if it is true ?
> > > > >
> > > > > Yes, telnetd is vulnerable.
> > > > >
> > > > The patch is available at:
> > > >
> > > > http://people.FreeBSD.org/~ru/telnetd.patch
> > > >
> > > >
> > > > Cheers,
> > > > --
> > > > Ruslan Ermilov Oracle Developer/DBA,
> > > > ru@sunbay.com Sunbay Software AG,
> > > > ru@FreeBSD.org FreeBSD committer,
> > > > +380.652.512.251 Simferopol, Ukraine
> > > >
> > > > http://www.FreeBSD.org The Power To Serve
> > > > http://www.oracle.com Enabling The Information Age
> > > >
> > > > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > > > with "unsubscribe freebsd-security" in the body of the message
> > > >
> > >
> > > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > > with "unsubscribe freebsd-security" in the body of the message
> > go to /usr/src/crypto/telnet/telnetd
> > and type
> > shell~# patch -p < /where/is/the/file.patch
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
> >
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?005d01c1107a$b6f57a40$0d00a8c0>