Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 Jul 1996 09:35:01 +0200
From:      Poul-Henning Kamp <phk@freebsd.org>
To:        jbhunt <jbhunt@mercury.gaianet.net>
Cc:        freebsd-security-notification@freebsd.org, freebsd-security@freebsd.org, root@mercury.gaianet.net
Subject:   Re: New EXPLOIT located! 
Message-ID:  <4865.837416101@critter.tfs.com>
In-Reply-To: Your message of "Sun, 14 Jul 1996 23:52:43 PDT." <Pine.BSF.3.91.960714212321.1806A-300000@mercury.gaianet.net> 

next in thread | previous in thread | raw e-mail | index | archive | help
>Ok, for almost 3 weeks now we at Gaianet have been tracking root hackers 
>around our box. FINALLY, today at about 3 pm one of them made a BIG BIG 
>mistake. Fortunately, for us I was around to watch what happened and kill 
>the user before he was able to erase his history files and the exploit 
>itself. So here are the files necessary to fix whatever hole this 
>exploits. We run Freebsd Current so it obviously makes most freebsd 
>systems vulnerable to a root attack. I appreciate any help you can offer.

OK, this is the rdist hole, it's already being worked in I think.

remove the rdist program from your system, or just remove the setuid
bit from it.

Do normal "we've been hacked cleanup".

--
Poul-Henning Kamp           | phk@FreeBSD.ORG       FreeBSD Core-team.
http://www.freebsd.org/~phk | phk@login.dknet.dk    Private mailbox.
whois: [PHK]                | phk@ref.tfs.com       TRW Financial Systems, Inc.
Future will arrive by its own means, progress not so.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4865.837416101>