From owner-freebsd-hackers Fri Aug 1 18:35:18 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id SAA24309 for hackers-outgoing; Fri, 1 Aug 1997 18:35:18 -0700 (PDT) Received: from colonel.42inc.com (colonel.42inc.com [205.217.47.81]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id SAA24302 for ; Fri, 1 Aug 1997 18:35:14 -0700 (PDT) Received: from [205.217.47.88] (vegas.42inc.com [205.217.47.88]) by colonel.42inc.com (8.8.5/8.6.12) with ESMTP id SAA29356 for ; Fri, 1 Aug 1997 18:34:53 -0700 (PDT) X-Sender: jal@205.217.47.82 Message-Id: In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Fri, 1 Aug 1997 18:34:16 -0700 To: hackers@FreeBSD.ORG From: Jamie Lawrence Subject: Re: security hole on FreeBSD 2.2.2 Sender: owner-freebsd-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk The poster might be thinking of suidperl*, which I believe does pose security problems in some cases. -j >On Fri, 1 Aug 1997, Ben Black wrote: [...] > But what the hell is superl? I don't think it comes with 2.2.2. > >Tom > > >> On Fri, 1 Aug 1997, Sergio Lenzi wrote: >> >> > >> > >> > >> > Hello all >> > >> > Forgive me to send this message on this list. >> > >> > There is a security hole on FreeBSD 2.2.2 >> > >> > This is done using a script and a superl* on /usr/bin >> > >> > A friend of mine received root priority by telneting to my machine (2.2.2) >> > and executing a perl script. >> > >> > My solution: remove /usr/bin/superl* >> > >> > Hope this can helphelp >> > >> > >> >> -- "I am about to, or going to, die. Either expression is used." --Last words of Mme. Brouhors, Grammarian, August, 1752. __________________________________________________________________ jamie@42is.com Special Agent jal@acm.org