Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 Apr 2002 22:45:17 +0200
From:      Nicolas Rachinsky <list@rachinsky.de>
To:        security@FreeBSD.ORG
Subject:   Re: [Corrected message] This OpenBSD local root hole may affect some FreeBSD systems
Message-ID:  <20020411204516.GA51239@pc5.abc>
In-Reply-To: <4.3.2.7.2.20020411141011.030a0b80@nospam.lariat.org>
References:  <4.3.2.7.2.20020411141011.030a0b80@nospam.lariat.org>

next in thread | previous in thread | raw e-mail | index | archive | help
* Brett Glass <brett@lariat.org> [2002-04-11 14:12:01 -0600]:
> [This is a corrected version of the previous message, which omitted
> the word "isn't" near the beginning of the second paragraph.]
> 
> The vulnerability described in the message below is a classic
> "in-band signalling" problem that may give an unauthorized user
> the ability to run an arbitrary command as root. 
> 
> Fortunately, the vulnerability isn't present in FreeBSD's daily, weekly,
> and monthly maintenance scripts, because they use sendmail rather 
> than /bin/mail. Nonetheless, the same patch should be applied to 
> FreeBSD's /bin/mail due to the possibility that other privileged
> utilities (or user-written scripts) might use /bin/mail instead of 
> sendmail to create e-mail messages.

man mail says:
     -I    Forces mail to run in interactive mode even when input is not a
           terminal.  In particular, the `~' special character when sending
           mail is only active in interactive mode.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020411204516.GA51239>