Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 Jul 1996 00:43:05 -0700 (PDT)
From:      -Vince- <vince@mercury.gaianet.net>
To:        Poul-Henning Kamp <phk@freebsd.org>
Cc:        jbhunt <jbhunt@mercury.gaianet.net>, freebsd-security-notification@freebsd.org, freebsd-security@freebsd.org, root@mercury.gaianet.net
Subject:   Re: New EXPLOIT located! 
Message-ID:  <Pine.BSF.3.91.960715004202.1637C-100000@mercury.gaianet.net>
In-Reply-To: <4865.837416101@critter.tfs.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 15 Jul 1996, Poul-Henning Kamp wrote:

> >Ok, for almost 3 weeks now we at Gaianet have been tracking root hackers 
> >around our box. FINALLY, today at about 3 pm one of them made a BIG BIG 
> >mistake. Fortunately, for us I was around to watch what happened and kill 
> >the user before he was able to erase his history files and the exploit 
> >itself. So here are the files necessary to fix whatever hole this 
> >exploits. We run Freebsd Current so it obviously makes most freebsd 
> >systems vulnerable to a root attack. I appreciate any help you can offer.
> 
> OK, this is the rdist hole, it's already being worked in I think.
> 
> remove the rdist program from your system, or just remove the setuid
> bit from it.
> 
> Do normal "we've been hacked cleanup".

	While we're at the subject, is there a hole with mount_msdos also 
because the guy had some text on mount_msdos but I deleted the 
/sbin/mount_msdos and -current still installs with the setuid bit...

Vince





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960715004202.1637C-100000>