Date: Sun, 10 Aug 1997 12:44:37 -0800 From: Nicole <nicole@mediacity.com> To: Brian Mitchell <brian@firehouse.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: procfs hole Message-ID: <Chameleon.871242709.work@blabgoo> References: <Pine.NEB.3.96.970810052824.3287A-100000@apocalypse.saturn.net>
next in thread | previous in thread | raw e-mail | index | archive | help
> There is a major hole in procfs under FreeBSD 2.2.1 (2.1 is not affected, > I have not tested 3.x but I believe it to be vulnerable as well) along > with OpenBSD (not tested by me, but by someone else -- believe it was > 2.1-RELEASE although obsd doesnt mount procfs by default like freebsd > does). Hello I have tried to run Brians script to test a few servers, however as I am new to some of this, I'm not sure that i am using it correctly and would appreciate any help. Basicly I have saved the file as a .sh file and am trying to execute it. I am using /bin/sh as my shell. The errors I receive are: u_char: not found 0x8d,: not found 0x9a,: not found ./h.sh: /bin: permission denied ./h.sh: /bin: permission denied u_char: not found ./h.sh: 15: Syntax error: word unexpected (expecting ")") What stupidly obvious thing am I missing... Thanks Nicole nicole@mediacity.com |\ __ /| (`\ http://www.mediacity.com Nicole Harrington | o_o |__ ) ) Phone: 415-237-1464 // \\ Pager: 415-301-2482 Systems Administrator ------------------------(((---(((------------------------------------- * What do you mean Spelling Errors? My Modem is Error Correcting! A cynic is an idealist who's tired. -- Courtesy is owed. Respect is earned. Love is given. -- -----------------------------------------------------------------------
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Chameleon.871242709.work>