Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 Jul 1996 04:06:00 -0400
From:      "Gary Palmer" <gpalmer@freebsd.org>
To:        jbhunt <jbhunt@mercury.gaianet.net>
Cc:        freebsd-security@freebsd.org, root@mercury.gaianet.net
Subject:   Re: New EXPLOIT located! 
Message-ID:  <1232.837417960@orion.webspan.net>
In-Reply-To: Your message of "Sun, 14 Jul 1996 23:52:43 PDT." <Pine.BSF.3.91.960714212321.1806A-300000@mercury.gaianet.net> 

next in thread | previous in thread | raw e-mail | index | archive | help
jbhunt wrote in message ID
<Pine.BSF.3.91.960714212321.1806A-300000@mercury.gaianet.net>:
> Ok, for almost 3 weeks now we at Gaianet have been tracking root hackers 
> around our box. FINALLY, today at about 3 pm one of them made a BIG BIG 
> mistake. Fortunately, for us I was around to watch what happened and kill 
> the user before he was able to erase his history files and the exploit 
> itself. So here are the files necessary to fix whatever hole this 
> exploits. We run Freebsd Current so it obviously makes most freebsd 
> systems vulnerable to a root attack. I appreciate any help you can offer.

from the source supplied:

--SNIP--
   execl("/usr/bin/rdist", "rdist", "-d", buff, "-d", buff, NULL);
--SNIP--

You *HAVE* applied the rdist patch(es), or better yet, DISABLED rdist
totally, haven't you?

Gary
--
Gary Palmer                                          FreeBSD Core Team Member
FreeBSD: Turning PC's into workstations. See http://www.FreeBSD.ORG/ for info



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1232.837417960>