Date: Thu, 11 Feb 1999 13:35:32 -0800 (PST) From: kaiserppo@erols.com To: freebsd-gnats-submit@FreeBSD.ORG Subject: i386/10037: Security Hole -- Easy way to get users passwords Message-ID: <199902112135.NAA21119@hub.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 10037 >Category: i386 >Synopsis: Security Hole -- Easy way to get users passwords >Confidential: no >Severity: non-critical >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Feb 11 13:40:01 PST 1999 >Closed-Date: >Last-Modified: >Originator: Ben Howard >Release: 2.2.6 i386 >Organization: <home> >Environment: FreeBSD rasputin.net 2.2.6 RELEASE FreeBSD 2.2.6-RELEASE #5 Wed Feb 3,19:15:05 GMT 1999 toor@rasputin.net:/usr/src/sys/compile/RASPUTIN i386 >Description: Simple- a superuser can run cat on the /dev/ttyvX (X being the virtual terminal number), when a user enters in there password, the superuser can see the password. >How-To-Repeat: Log on as a superuser type: cat /dev/ttyvX then flop over to that terminal log on go back to the terminal where you logged on as superuser notice the lovely password that you know have. >Fix: No know fix. But it is illegal for buisnesses, schools, etc. to archive password of their users. This also works for network logons. >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199902112135.NAA21119>