Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 08 Nov 1999 14:15:42 -0500
From:      Mike Tancsa <mike@sentex.net>
To:        David Gilbert <dgilbert@velocet.ca>, freebsd-security@FreeBSD.ORG
Subject:   Re: A new 'sploit?
Message-ID:  <3.0.5.32.19991108141542.0181c690@staff.sentex.ca>
In-Reply-To: <14375.5840.975982.927941@trooper.velocet.net>

next in thread | previous in thread | raw e-mail | index | archive | help
At 01:30 PM 11/8/99 -0500, David Gilbert wrote:
>On one of our client's servers, we found a directory structure full of 
>alternating <CR>Your public key (512-bit) goes here<CR> and
>capital-A-repeated directory names.  I assume the script kiddie should 
>have replaced all the capital-A's with their public key.  Inside these 
>directories 'find.core' was linked to /root/.ssh/authorized_keys


It is an 'old' exploit for the fts bug/hole.  See the ongoing discussion 
"file name with questions - rm on it seg faults!!!"

and

ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-99:05.fts.asc

This does effect 2.2.x, however if you cvsup RELENG_2_2 it is patched...


	---Mike


------------------------------------------------------------------------
Mike Tancsa,                          	          tel 01.519.651.3400
Network Administrator,     			  mike@sentex.net
Sentex Communications                 		  www.sentex.net
Cambridge, Ontario Canada


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.5.32.19991108141542.0181c690>