Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 9 Jan 1998 11:19:48 -0500 (EST)
From:      Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
To:        igor@alecto.physics.uiuc.edu (Igor Roshchin)
Cc:        security@FreeBSD.ORG
Subject:   riptrace.c (fwd)
Message-ID:  <199801091619.LAA08275@khavrinen.lcs.mit.edu>
In-Reply-To: <199801082251.QAA14645@alecto.physics.uiuc.edu>
References:  <199801082251.QAA14645@alecto.physics.uiuc.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
<<On Thu, 8 Jan 1998 16:51:45 -0600 (CST), igor@alecto.physics.uiuc.edu (Igor Roshchin) said:

> I probably should have tested it myself,
> but don't have possibility at the moment.
> So, the question is:
> Is FreeBSD vulnerable to this or to a modified exploit ?

No.  FreeBSD's routed will only permit remote control of tracing under
the following conditions:

1) A trace file was specified on the routed command line.
2) The requested trace file is the same as the one specified in (1).

See routed/trace.c for details.

-GAWollman

--
Garrett A. Wollman   | O Siem / We are all family / O Siem / We're all the same
wollman@lcs.mit.edu  | O Siem / The fires of freedom 
Opinions not those of| Dance in the burning flame
MIT, LCS, CRS, or NSA|                     - Susan Aglukark and Chad Irschick



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199801091619.LAA08275>