Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 21 Jun 2001 12:17:16 -0700 (PDT)
From:      "Crist J. Clark" <cjc@FreeBSD.org>
To:        cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: src/etc security
Message-ID:  <200106211917.f5LJHGr79355@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
cjc         2001/06/21 12:17:16 PDT

  Modified files:
    etc                  security 
  Log:
  Fixing a bug reported on freebsd-security. It is possible for
  non-printable characters to sneak into /var/log/messages (e.g.
  someone aims a Solaris/Linux RCP exploit at your FreeBSD box and
  you end up with his shellcode as part of a log entry). You might
  get something like,
  
    host.mydom.org login failures:
    Binary file (standard input) matches
  
  In the daily security script as a result. Allowing attackers to
  mess with your security script's ability to accurately report
  is a Bad Thing. Tell grep(1) to treat /var/log/messages like a
  text file even if it has non-printable characters.
  
  Submitted by:	Tim Zingelman <zingelman@fnal.gov> on freebsd-security
  Approved by:	ru
  MFC after:	1 week
  
  Revision  Changes    Path
  1.54      +2 -2      src/etc/security


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200106211917.f5LJHGr79355>