Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 1 Aug 1997 18:52:44 -0500 (CDT)
From:      Dan Riley <daniel@vailsys.com>
To:        Sergio Lenzi <lenzi@bsi.com.br>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: security hole on FreeBSD 2.2.2
Message-ID:  <Pine.BSF.3.91.970801185128.6383A-100000@crocodile>
In-Reply-To: <Pine.BSF.3.96.970801201749.25653A-100000@server.netplus.com.br>

next in thread | previous in thread | raw e-mail | index | archive | help


On Fri, 1 Aug 1997, Sergio Lenzi wrote:

> 
> 
>    
> Hello all 
> 
> Forgive me to send this message on this list.
> 
> There is a security hole on FreeBSD 2.2.2
> 
> This is done using a script and a superl* on /usr/bin
> 
> A friend of mine received root priority by telneting to my machine (2.2.2)
> and executing a perl script.
> 
> My solution: remove /usr/bin/superl*
> 
> Hope this can helphelp
> 

Ditto, at least 3 of my machines were hacked using this method, all of 
which were installed last week. (2.2.2-R)




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.970801185128.6383A-100000>