Date: Thu, 19 Jul 2001 20:50:16 +0300 From: Ruslan Ermilov <ru@FreeBSD.ORG> To: Assar Westerlund <assar@FreeBSD.ORG> Cc: "Jacques A. Vidrine" <n@nectar.com>, Matt Dillon <dillon@earth.backplane.com>, Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>, Mike Tancsa <mike@sentex.net>, Kris Kennaway <kris@obsecurity.org>, security@FreeBSD.ORG Subject: Re: FreeBSD remote root exploit ? Message-ID: <20010719205016.A67829@sunbay.com> In-Reply-To: <5l8zhk25v9.fsf@assaris.sics.se>; from assar@FreeBSD.ORG on Thu, Jul 19, 2001 at 07:20:10PM %2B0200 References: <200107190547.f6J5lmD66188@cwsys.cwsent.com> <200107190747.f6J7lMU71487@earth.backplane.com> <20010719102230.L27900@madman.nectar.com> <5lpuaw26kt.fsf@assaris.sics.se> <20010719201009.A61061@sunbay.com> <5l8zhk25v9.fsf@assaris.sics.se>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 19, 2001 at 07:20:10PM +0200, Assar Westerlund wrote: > Ruslan Ermilov <ru@FreeBSD.ORG> writes: > > > I don't know if it's exploitable either. I don't _think_ so, but I've > > > of course fixed the problem anyways. > > > > > You mean, in netflush()? > > No, in output_data() (in heimdal's telnetd/global.c) > Doh, of course I meant output_data(), but itojun done a good job in NetBSD. output_data() attempts netflush() before a failure. See NetBSD's state.c,v 1.16. Cheers, -- Ruslan Ermilov Oracle Developer/DBA, ru@sunbay.com Sunbay Software AG, ru@FreeBSD.org FreeBSD committer, +380.652.512.251 Simferopol, Ukraine http://www.FreeBSD.org The Power To Serve http://www.oracle.com Enabling The Information Age To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010719205016.A67829>