Date: Fri, 9 Jan 1998 11:19:48 -0500 (EST) From: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> To: igor@alecto.physics.uiuc.edu (Igor Roshchin) Cc: security@FreeBSD.ORG Subject: riptrace.c (fwd) Message-ID: <199801091619.LAA08275@khavrinen.lcs.mit.edu> In-Reply-To: <199801082251.QAA14645@alecto.physics.uiuc.edu> References: <199801082251.QAA14645@alecto.physics.uiuc.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
<<On Thu, 8 Jan 1998 16:51:45 -0600 (CST), igor@alecto.physics.uiuc.edu (Igor Roshchin) said: > I probably should have tested it myself, > but don't have possibility at the moment. > So, the question is: > Is FreeBSD vulnerable to this or to a modified exploit ? No. FreeBSD's routed will only permit remote control of tracing under the following conditions: 1) A trace file was specified on the routed command line. 2) The requested trace file is the same as the one specified in (1). See routed/trace.c for details. -GAWollman -- Garrett A. Wollman | O Siem / We are all family / O Siem / We're all the same wollman@lcs.mit.edu | O Siem / The fires of freedom Opinions not those of| Dance in the burning flame MIT, LCS, CRS, or NSA| - Susan Aglukark and Chad Irschick
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199801091619.LAA08275>