Date: Thu, 19 Jul 2001 12:46:58 -0500 (CDT) From: Chris Byrnes <chris@jeah.net> To: alexus <ml@db.nexgen.com> Cc: <security@FreeBSD.ORG> Subject: Re: [PATCH] Re: FreeBSD remote root exploit ? Message-ID: <20010719124656.S72422-100000@awww.jeah.net> In-Reply-To: <005d01c1107a$b6f57a40$0d00a8c0@alexus>
next in thread | previous in thread | raw e-mail | index | archive | help
yup Chris Byrnes, Managing Member JEAH Communications, LLC On Thu, 19 Jul 2001, alexus wrote: > su-2.05# cd /usr/src/libexec/telnetd/ > su-2.05# make all install > install -c -s -o root -g wheel -m 555 telnetd /usr/libexec > install -c -o root -g wheel -m 444 telnetd.8.gz /usr/share/man/man8 > su-2.05# > > hmm that's it? seems like too short compilation .. is it supposed to be l= ike > this? > > ----- Original Message ----- > From: "Chris Byrnes" <chris@jeah.net> > To: "alexus" <ml@db.nexgen.com> > Cc: <security@FreeBSD.ORG> > Sent: Thursday, July 19, 2001 1:39 PM > Subject: Re: [PATCH] Re: FreeBSD remote root exploit ? > > > root# cd /usr/src/libexec/telnetd ; make all install ; killall -HUP inetd > > > Chris Byrnes, Managing Member > JEAH Communications, LLC > > On Thu, 19 Jul 2001, alexus wrote: > > > uh. ok:) > > > > this part is done.. should i recompile telnetd now somehow? if so then > > how?:) > > > > ----- Original Message ----- > > From: "Pierre-Luc Lesp=E9rance" <silence@oksala.org> > > To: <security@FreeBSD.ORG> > > Sent: Thursday, July 19, 2001 1:28 PM > > Subject: Re: [PATCH] Re: FreeBSD remote root exploit ? > > > > > > > alexus wrote: > > > > > > > > could you also include some sort of instruction how to apply it? > > > > > > > > thanks in advance > > > > > > > > ----- Original Message ----- > > > > From: "Ruslan Ermilov" <ru@FreeBSD.ORG> > > > > To: "Przemyslaw Frasunek" <venglin@freebsd.lublin.pl> > > > > Cc: <security@FreeBSD.ORG> > > > > Sent: Thursday, July 19, 2001 1:14 PM > > > > Subject: [PATCH] Re: FreeBSD remote root exploit ? > > > > > > > > > On Thu, Jul 19, 2001 at 11:03:53AM +0200, Przemyslaw Frasunek wro= te: > > > > > > > Posted to bugtraq is a notice about telnetd being remotely ro= ot > > > > > > > exploitable. Does anyone know if it is true ? > > > > > > > > > > > > Yes, telnetd is vulnerable. > > > > > > > > > > > The patch is available at: > > > > > > > > > > http://people.FreeBSD.org/~ru/telnetd.patch > > > > > > > > > > > > > > > Cheers, > > > > > -- > > > > > Ruslan Ermilov Oracle Developer/DBA, > > > > > ru@sunbay.com Sunbay Software AG, > > > > > ru@FreeBSD.org FreeBSD committer, > > > > > +380.652.512.251 Simferopol, Ukraine > > > > > > > > > > http://www.FreeBSD.org The Power To Serve > > > > > http://www.oracle.com Enabling The Information Age > > > > > > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > > > > > with "unsubscribe freebsd-security" in the body of the message > > > > > > > > > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > > > > with "unsubscribe freebsd-security" in the body of the message > > > go to /usr/src/crypto/telnet/telnetd > > > and type > > > shell~# patch -p < /where/is/the/file.patch > > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > > > with "unsubscribe freebsd-security" in the body of the message > > > > > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > > with "unsubscribe freebsd-security" in the body of the message > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010719124656.S72422-100000>