From owner-freebsd-hackers Fri Aug 1 17:19:13 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id RAA21190 for hackers-outgoing; Fri, 1 Aug 1997 17:19:13 -0700 (PDT) Received: from misery.sdf.com (misery.sdf.com [204.244.210.193]) by hub.freebsd.org (8.8.5/8.8.5) with SMTP id RAA21183 for ; Fri, 1 Aug 1997 17:19:07 -0700 (PDT) Received: from tom by misery.sdf.com with smtp (Exim 1.62 #1) id 0wuRuD-00029S-00; Fri, 1 Aug 1997 17:18:49 -0700 Date: Fri, 1 Aug 1997 17:18:48 -0700 (PDT) From: Tom Samplonius To: Ben Black cc: Sergio Lenzi , hackers@freebsd.org Subject: Re: security hole on FreeBSD 2.2.2 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Fri, 1 Aug 1997, Ben Black wrote: > wow, with a problem report like that i'll be sure to get right on > removing superl. how about a copy of the script or an explanaition of > the bug? But what the hell is superl? I don't think it comes with 2.2.2. Tom > On Fri, 1 Aug 1997, Sergio Lenzi wrote: > > > > > > > > > Hello all > > > > Forgive me to send this message on this list. > > > > There is a security hole on FreeBSD 2.2.2 > > > > This is done using a script and a superl* on /usr/bin > > > > A friend of mine received root priority by telneting to my machine (2.2.2) > > and executing a perl script. > > > > My solution: remove /usr/bin/superl* > > > > Hope this can helphelp > > > > > >