Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 12 Jul 1999 21:26:21 +0930 (CST)
From:      Mark Newton <newton@atdot.dotat.org>
To:        mike@sentex.net (Mike Tancsa)
Cc:        security@FreeBSD.ORG, stable@FreeBSD.ORG
Subject:   Re: 3.x backdoor rootshell security hole
Message-ID:  <199907121156.VAA05155@atdot.dotat.org>
In-Reply-To: <4.1.19990712080116.053e4430@granite.sentex.ca> from "Mike Tancsa" at Jul 12, 99 08:05:03 am

next in thread | previous in thread | raw e-mail | index | archive | help
Mike Tancsa wrote:

 > Has anyone looked at the articled below ? Here is a quote,
 > "The following module was a nice idea I had when playing around with the
 > proc structure. Load this module, and you can 'SU' without a password.

If you have enough privileges to load a module, you have enough 
privileges to su without a password already (by creating an suid
shell, for example)

   - mark

--------------------------------------------------------------------
I tried an internal modem,                    newton@atdot.dotat.org
     but it hurt when I walked.                          Mark Newton
----- Voice: +61-4-1620-2223 ------------- Fax: +61-8-82231777 -----


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199907121156.VAA05155>