Date: Mon, 15 Jul 1996 03:38:48 -0700 (PDT) From: -Vince- <vince@mercury.gaianet.net> To: Gary Palmer <gpalmer@freebsd.org> Cc: jbhunt <jbhunt@mercury.gaianet.net>, freebsd-security@freebsd.org, root@mercury.gaianet.net Subject: Re: New EXPLOIT located! Message-ID: <Pine.BSF.3.91.960715033754.1637K-100000@mercury.gaianet.net> In-Reply-To: <3588.837425885@orion.webspan.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 15 Jul 1996, Gary Palmer wrote: > -Vince- wrote in message ID > <Pine.BSF.3.91.960715012012.1637F-100000@mercury.gaianet.net>: > > > You *HAVE* applied the rdist patch(es), or better yet, DISABLED rdist > > > totally, haven't you? > > > Only took out the setuid flag... Have the patches been applied to > > the latest -current since I just recompiled rdist from the latest > > -current sources... > > Huh? rdist shouldn't be vunerable if it HAS had the setuid bit > removed... (unless I really am mis-understanding something) Hmmm, even with the setuid bit, his exploit doesn't work anymore... I guess the sources for July 14th really changed it cause it can't find distfile for rdist any longer... Vince
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960715033754.1637K-100000>