Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 1 Dec 1999 16:29:51 -0500 (EST)
From:      "Keith R. Jarvis" <kjarvis@iss.net>
To:        freebsd-security@freebsd.org
Subject:   Re: [Re: [btellier@USA.NET: Several FreeBSD-3.3 vulnerabilities] ]
Message-ID:  <199912012129.QAA01815@arden.iss.net>
In-Reply-To: <19991201132151.A1226@norn.ca.eu.org> from "Chris Piazza" at Dec 1, 99 01:21:51 pm

next in thread | previous in thread | raw e-mail | index | archive | help
> 
> On Wed, Dec 01, 1999 at 01:02:57PM -0700, Brock Tellier wrote:
> > 
> > Personally, I don't think it is at all unreasonable to do a full 2700 port
> > install via sysinstall and audit the 200 or so suid-programs.  Sure, it's
> > important that the others be free from symlink problems and in a few cases,
> > buffer overflows, but focusing, as I did, on the suids wouldn't be
> > ridiculously difficult.  More than 50% of these programs could safely lose
> > their suid-bit. Considering the number of people who will actually need
> > "xmindpath" suid vs. the number of people who just do a full install because
> 
> Excellent.  So when can we expect you to finish this project?
> 

Now thats shooting the messenger

-- 
Keith R. Jarvis (kjarvis@iss.net)             http://xforce.iss.net
Internet Security Systems, Inc.               +1-678-443-6149 (direct)
Adaptive Network Security for the Enterprise  +1-678-443-6479 (fax)


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199912012129.QAA01815>