Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 02 Aug 1997 14:02:26 -0600
From:      Warner Losh <imp@village.org>
To:        Ben Black <black@zen.cypher.net>
Cc:        Sergio Lenzi <lenzi@bsi.com.br>, hackers@freebsd.org
Subject:   Re: security hole on FreeBSD 2.2.2 
Message-ID:  <E0wukNf-0005oI-00@rover.village.org>
In-Reply-To: Your message of "Fri, 01 Aug 1997 20:06:59 EDT." <Pine.LNX.3.91.970801200610.3568F-100000@zen.cypher.net> 
References:  <Pine.LNX.3.91.970801200610.3568F-100000@zen.cypher.net>  

next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.LNX.3.91.970801200610.3568F-100000@zen.cypher.net> Ben Black writes:
: wow, with a problem report like that i'll be sure to get right on 
: removing superl.  how about a copy of the script or an explanaition of 
: the bug?

The problem was that you could pass a huge command line arg, overflow
a buffer in some cases, and get an egg to hatch a root shell...  Check
out the bugtraq archive for more details.

Warner



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E0wukNf-0005oI-00>