From owner-freebsd-security Mon Jul 15 19:37:25 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id TAA19422 for security-outgoing; Mon, 15 Jul 1996 19:37:25 -0700 (PDT) Received: from post.io.org (post.io.org [198.133.36.6]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id TAA19414 for ; Mon, 15 Jul 1996 19:37:19 -0700 (PDT) Received: from zap.io.org (taob@zap.io.org [198.133.36.81]) by post.io.org (8.7.5/8.7.3) with SMTP id WAA06204; Mon, 15 Jul 1996 22:37:02 -0400 (EDT) Date: Mon, 15 Jul 1996 22:37:02 -0400 (EDT) From: Brian Tao To: -Vince- cc: FREEBSD-SECURITY-L Subject: Re: New EXPLOIT located! In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.org X-Loop: FreeBSD.org Precedence: bulk On Mon, 15 Jul 1996, -Vince- wrote: > > Hmmm, even with the setuid bit, his exploit doesn't work anymore... > I guess the sources for July 14th really changed it cause it can't find > distfile for rdist any longer... Nate Williams commited the changes on July 12. -- Brian Tao (BT300, taob@io.org, taob@ican.net) Senior Systems and Network Administrator, Internet Canada Corp. "Though this be madness, yet there is method in't"