From owner-freebsd-hackers Wed Aug 13 00:30:48 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id AAA01775 for hackers-outgoing; Wed, 13 Aug 1997 00:30:48 -0700 (PDT) Received: from lab321.ru (anonymous1.omsk.net.ru [194.226.32.34]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id AAA01745 for ; Wed, 13 Aug 1997 00:30:25 -0700 (PDT) Received: from localhost (localhost.l321.omsk.net.ru [127.0.0.1]) by lab321.ru (8.8.6/8.8.5) with SMTP id OAA07948; Wed, 13 Aug 1997 14:30:36 +0700 (OSD) Date: Wed, 13 Aug 1997 14:30:35 +0700 (OSD) From: Eugeny Kuzakov To: "Lenzi, Sergio" cc: hackers@FreeBSD.ORG Subject: Re: Security hole script. In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Mon, 4 Aug 1997, Lenzi, Sergio wrote: > > > Hello all. > > Here is the "script" that opens a hole in our FreeBSD 2.2.2... > > from a friend of mine (lgarcia@netlan.com.br) > ---------------------------cut------------------------------- > > execl("/usr/bin/sperl4.036", "/usr/bin/sperl4.036", buf, NULL); > } > > ---------------------------------------------------------cut--------- I tested it on FreeBSD 2.1.7.1. It works fine ! :) Best wishes, Eugeny Kuzakov Laboratory 321 ( Omsk, Russia ) kev@lab321.ru