Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 Feb 1999 13:35:32 -0800 (PST)
From:      kaiserppo@erols.com
To:        freebsd-gnats-submit@FreeBSD.ORG
Subject:   i386/10037: Security Hole -- Easy way to get users passwords
Message-ID:  <199902112135.NAA21119@hub.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         10037
>Category:       i386
>Synopsis:       Security Hole -- Easy way to get users passwords
>Confidential:   no
>Severity:       non-critical
>Priority:       high
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Feb 11 13:40:01 PST 1999
>Closed-Date:
>Last-Modified:
>Originator:     Ben Howard
>Release:        2.2.6 i386
>Organization:
<home>
>Environment:
FreeBSD rasputin.net 2.2.6 RELEASE FreeBSD 2.2.6-RELEASE #5
Wed Feb 3,19:15:05 GMT 1999 toor@rasputin.net:/usr/src/sys/compile/RASPUTIN i386
>Description:
Simple- a superuser can run cat on the /dev/ttyvX (X being the virtual
terminal number), when a user enters in there password, the superuser
can see the password.
>How-To-Repeat:
Log on as a superuser
type: cat /dev/ttyvX
then flop over to that terminal
log on
go back to the terminal where you logged on as superuser
notice the lovely password that you know have.
>Fix:
No know fix. But it is illegal for buisnesses, schools, etc. to archive
password of their users. This also works for network logons.
>Release-Note:
>Audit-Trail:
>Unformatted:

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199902112135.NAA21119>