Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Jul 2001 19:40:28 +0200
From:      "serkoon" <serkoon@thedarkside.nl>
To:        <security@freebsd.org>
Subject:   Re: FreeBSD 4.3 local root
Message-ID:  <005701c10af9$bd7a7c20$0200000a@kilmarnock>
References:  <657B20E93E93D4118F9700D0B73CE3EA02FFEFB7@goofy.epylon.lan>

next in thread | previous in thread | raw e-mail | index | archive | help
Somebody said something somewhere:

> is the binary named 'vv' ?
> 
> It has to be.

The binary doesn't need to be named 'vv', that's bull. 

However.. there are several reports (myself included)
of people not being able to succesfully run the exploit
because of the used shell. Normally I use bash (2.05.?),
but somebody told me he could succesfully exploit
the bug using Midnight Commander, so I tried that. 

It worked for me. So I did a bit thinking and executed
/bin/sh. That was what was needed to run the exploit
successfully. No need to change the exploitcode
or build it as 'vv', just use /bin/sh as shell. 

Regards.. 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?005701c10af9$bd7a7c20$0200000a>