Date: Fri, 1 Aug 1997 20:29:11 -0400 (EDT) From: Ben Black <black@zen.cypher.net> To: Tom Samplonius <tom@sdf.com> Cc: Sergio Lenzi <lenzi@bsi.com.br>, hackers@FreeBSD.ORG Subject: Re: security hole on FreeBSD 2.2.2 Message-ID: <Pine.LNX.3.91.970801202857.3568G-100000@zen.cypher.net> In-Reply-To: <Pine.BSF.3.95q.970801171806.8042B-100000@misery.sdf.com>
next in thread | previous in thread | raw e-mail | index | archive | help
exactly. i have no clue what this guy is talking about. On Fri, 1 Aug 1997, Tom Samplonius wrote: > > On Fri, 1 Aug 1997, Ben Black wrote: > > > wow, with a problem report like that i'll be sure to get right on > > removing superl. how about a copy of the script or an explanaition of > > the bug? > > But what the hell is superl? I don't think it comes with 2.2.2. > > Tom > > > > On Fri, 1 Aug 1997, Sergio Lenzi wrote: > > > > > > > > > > > > > > Hello all > > > > > > Forgive me to send this message on this list. > > > > > > There is a security hole on FreeBSD 2.2.2 > > > > > > This is done using a script and a superl* on /usr/bin > > > > > > A friend of mine received root priority by telneting to my machine (2.2.2) > > > and executing a perl script. > > > > > > My solution: remove /usr/bin/superl* > > > > > > Hope this can helphelp > > > > > > > > > > >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.3.91.970801202857.3568G-100000>