Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 1 Aug 1997 20:29:11 -0400 (EDT)
From:      Ben Black <black@zen.cypher.net>
To:        Tom Samplonius <tom@sdf.com>
Cc:        Sergio Lenzi <lenzi@bsi.com.br>, hackers@FreeBSD.ORG
Subject:   Re: security hole on FreeBSD 2.2.2
Message-ID:  <Pine.LNX.3.91.970801202857.3568G-100000@zen.cypher.net>
In-Reply-To: <Pine.BSF.3.95q.970801171806.8042B-100000@misery.sdf.com>

next in thread | previous in thread | raw e-mail | index | archive | help
exactly.  i have no clue what this guy is talking about.

On Fri, 1 Aug 1997, Tom Samplonius wrote:

> 
> On Fri, 1 Aug 1997, Ben Black wrote:
> 
> > wow, with a problem report like that i'll be sure to get right on 
> > removing superl.  how about a copy of the script or an explanaition of 
> > the bug?
> 
>   But what the hell is superl?  I don't think it comes with 2.2.2.
> 
> Tom
> 
> 
> > On Fri, 1 Aug 1997, Sergio Lenzi wrote:
> > 
> > > 
> > > 
> > >    
> > > Hello all 
> > > 
> > > Forgive me to send this message on this list.
> > > 
> > > There is a security hole on FreeBSD 2.2.2
> > > 
> > > This is done using a script and a superl* on /usr/bin
> > > 
> > > A friend of mine received root priority by telneting to my machine (2.2.2)
> > > and executing a perl script.
> > > 
> > > My solution: remove /usr/bin/superl*
> > > 
> > > Hope this can helphelp
> > > 
> > > 
> > 
> > 
> 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.3.91.970801202857.3568G-100000>