From owner-freebsd-security Thu Jun 27 16:02:59 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id QAA04942 for security-outgoing; Thu, 27 Jun 1996 16:02:59 -0700 (PDT) Received: from bitbucket.edmweb.com (bitbucket.edmweb.com [204.244.190.9]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id QAA04929 for ; Thu, 27 Jun 1996 16:02:55 -0700 (PDT) Received: (from root@localhost) by bitbucket.edmweb.com (8.6.12/8.6.12) id QAA00298; Thu, 27 Jun 1996 16:02:15 -0700 Date: Thu, 27 Jun 1996 16:02:10 -0700 (PDT) From: Steve Reid To: Guido van Rooij cc: freebsd-security@FreeBSD.ORG Subject: Re: CERT Advisory CA-96.12 - Vulnerability in suidperl (fwd) In-Reply-To: <199606271203.OAA25884@gvr.win.tue.nl> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > 2.1.0 IS vulnerable!!!!! > 2.1.0-current and stable are not vulnerable anymore. I'm using FreeBSD 2.1.0-RELEASE. Is it sufficent to remove the suid bit from the suidperl binaries? Or do I also have to search for scripts with the suid bit? I don't currently need suid perl scripts. ===================================================================== | Steve Reid - SysAdmin & Pres, EDM Web (http://www.edmweb.com/) | | Email: steve@edmweb.com Home Page: http://www.edmweb.com/steve/ | | PGP (2048/9F317269) Fingerprint: 11C89D1CD67287E68C09EC52443F8830 | | -- Disclaimer: JMHO, YMMV, TANSTAAFL, IANAL. -- | ===================================================================:)