Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 14 Dec 2000 13:08:47 -0800
From:      Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
To:        Kris Kennaway <kris@FreeBSD.ORG>
Cc:        John Howie <JHowie@msn.com>, security@FreeBSD.ORG
Subject:   Re: procfs vulnerability (Re: Details of www.freebsd.org  penetration)
Message-ID:  <200012142108.eBEL8wo04627@cwsys.cwsent.com>
In-Reply-To: Your message of "Thu, 14 Dec 2000 08:28:14 PST." <20001214082814.A25963@citusc.usc.edu> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <20001214082814.A25963@citusc.usc.edu>, Kris Kennaway writes:
> 
> --ZGiS0Q5IWpPtfppv
> Content-Type: text/plain; charset=us-ascii
> Content-Disposition: inline
> Content-Transfer-Encoding: quoted-printable
> 
> On Fri, Dec 15, 2000 at 07:53:32AM -0000, John Howie wrote:
> > Kris,
> >=20
> > Any chance you could let us know exactly what 'local root vulnerability' =
> was
> > exploited. As I recall it was originally stated that no weakness in FreeB=
> SD
> > itself had been leveraged. I appreciate that the hacker gained access to =
> the
> 
> No, I said that it was not a vulnerability in FreeBSD which allowed
> the initial penetration. The attackers wouldn't have been able to get
> in if this was any old FreeBSD system that wasn't running dodgy CGI
> scripts.
> 
> > system via CGI (and not a FreeBSD weakness) but once in he/she became root
> > through some other means. Was this vulnerability a configuration issue or
> > simply a known problem that had not been addressed?
> 
> The latter :-( In fact it was a problem which was brought to our
> attention a few days prior by the same guys who did the penetration -
> unfortunately it's taken us rather longer than I would have liked to
> get it fixed and an advisory released, a combination of the people
> involved being busy travelling, or just busy. However we've finally
> got it all together, it seems, and so an advisory should be out on
> Monday.

Has the fix been committed?  If so, is it procfs_ctl.c 1.22?


Regards,                         Phone:  (250)387-8437
Cy Schubert                        Fax:  (250)387-5766
Team Leader, Sun/Alpha Team   Internet:  Cy.Schubert@osg.gov.bc.ca
Open Systems Group, ITSD, ISTA
Province of BC





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200012142108.eBEL8wo04627>