Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 Jul 1996 23:59:17 -0400 (EDT)
From:      Brian Tao <taob@io.org>
To:        Dan Polivy <danp@carebase3.jri.org>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: is FreeBSD's rdist vulnerable?
Message-ID:  <Pine.NEB.3.92.960711235818.29155E-100000@zap.io.org>
In-Reply-To: <Pine.BSF.3.91.960703191714.1090A-100000@carebase3.jri.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 3 Jul 1996, Dan Polivy wrote:
>
> Has anyone read 8lgm's rdist advisory and attempted to see whether or not
> FreeBSD's rdist is vulnerable?  I use rdist to update various files here,
> and so I suppose getting id of the setuid bit would break it?  Thanks...

    It is indeed vulnerable.  I've mailed security-officer@freebsd.org
the exploit so someone can fix it right away.  2.1.0R and all the 2.2
snapshots are vulnerable.  I haven't tried any of the 2.1.5 releases.
--
Brian Tao (BT300, taob@io.org, taob@ican.net)
Senior Systems and Network Administrator, Internet Canada Corp.
"Though this be madness, yet there is method in't"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.92.960711235818.29155E-100000>