From owner-freebsd-security Sat Nov 16 17:35:29 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id RAA04038 for security-outgoing; Sat, 16 Nov 1996 17:35:29 -0800 (PST) Received: from mail.id.net (mail.id.net [199.125.1.6]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id RAA04033; Sat, 16 Nov 1996 17:35:25 -0800 (PST) Received: from server.id.net (server.id.net [199.125.1.10]) by mail.id.net (8.7.5/ID-Net) with ESMTP id UAA02467; Sat, 16 Nov 1996 20:39:44 -0500 (EST) Received: (from rls@localhost) by server.id.net (8.7.5/8.7.3) id UAA06048; Sat, 16 Nov 1996 20:35:34 -0500 (EST) From: Robert Shady Message-Id: <199611170135.UAA06048@server.id.net> Subject: Re: New sendmail bug... In-Reply-To: from Justen Stepka at "Nov 16, 96 06:56:47 pm" To: raistlin@chaos.ecpnet.com (Justen Stepka) Date: Sat, 16 Nov 1996 20:35:34 -0500 (EST) Cc: spork@super-g.com, freebsd-security@freebsd.org, freebsd-hackers@freebsd.org X-Mailer: ELM [version 2.4ME+ PL25 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > > It's nasty and easy... If you're on Bugtraq, you saw it. If anyone with > > more knowledge on this issue can check it out, please post to the list so > > everyone can free themselves of this vulnerability. Root in under 15 > > seconds with an account on the machine. If you need the 'sploit, please > > mail me here and I'll send it to you. I verified it on FBSD, NetBSD, > > Linux so far... Please send me this one, I have several shell servers here I'd like to test & plug... -- Rob === _/_/_/_/_/ _/_/_/_/ _/_/ _/ _/_/_/_/_/ _/_/_/_/_/ _/ _/ _/ _/_/_/ _/ _/ _/ _/_/_/_/ _/ _/_/_/_/_/ _/_/_/_/ _/ _/ _/_/_/_/_/ _/ Innovative Data Services Serving South-Eastern Michigan Internet Service Provider / Hardware Sales / Consulting Services Voice: (810)855-0404 / Fax: (810)855-3268 / Web: http://www.id.net