Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Aug 1997 12:44:37 -0800
From:      Nicole  <nicole@mediacity.com>
To:        Brian Mitchell  <brian@firehouse.net>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: procfs hole 
Message-ID:  <Chameleon.871242709.work@blabgoo>
References:  <Pine.NEB.3.96.970810052824.3287A-100000@apocalypse.saturn.net> 

next in thread | previous in thread | raw e-mail | index | archive | help

> There is a major hole in procfs under FreeBSD 2.2.1 (2.1 is not affected,
> I have not tested 3.x but I believe it to be vulnerable as well) along
> with OpenBSD (not tested by me, but by someone else -- believe it was
> 2.1-RELEASE although obsd doesnt mount procfs by default like freebsd
> does).


Hello
 I have tried to run Brians script to test a few servers, however as I am new to some of this, I'm not sure that i am using it 
correctly and would appreciate any help.

 Basicly I have saved the file as a .sh file and am trying to execute it. I am using /bin/sh as my shell.
 The errors I receive are:

u_char: not found
0x8d,: not found
0x9a,: not found
./h.sh: /bin: permission denied
./h.sh: /bin: permission denied
u_char: not found
./h.sh: 15: Syntax error: word unexpected (expecting ")")


 What stupidly obvious thing am I missing...


 Thanks


 Nicole




nicole@mediacity.com    |\ __ /| (`\  http://www.mediacity.com
Nicole Harrington       | o_o |__ ) ) Phone: 415-237-1464
                         // \\        Pager: 415-301-2482
                 Systems Administrator
------------------------(((---(((-------------------------------------
* What do you mean Spelling Errors? My Modem is Error Correcting!

A cynic is an idealist who's tired. --
Courtesy is owed. Respect is earned. Love is given. --
-----------------------------------------------------------------------




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Chameleon.871242709.work>