Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Jun 2002 21:07:36 +0200
From:      Poul-Henning Kamp <phk@critter.freebsd.dk>
To:        William Carrel <william.carrel@infospace.com>
Cc:        Jan Lentfer <Jan.Lentfer@web.de>, FreeBSD Security Mailling List <freebsd-security@FreeBSD.ORG>
Subject:   Re: OpenSSH Security (just a question, please no f-war) 
Message-ID:  <7492.1025118456@critter.freebsd.dk>
In-Reply-To: Your message of "Wed, 26 Jun 2002 11:43:45 PDT." <B93F5971.12FF3%william.carrel@infospace.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <B93F5971.12FF3%william.carrel@infospace.com>, William Carrel writes
:

>If and only if you have ChallengeResponseAuthentication set to "yes" then
>you are vulnerable to a hole that will allow malicious code to be executed
>as the privsep user ("sshd") in the /var/empty chroot().  This could lead to
>further compromisation of your system (even inside the chroot as a
>relatively unprivileged user).

Which reminds me that we should really tweak the code and put it in a
jail instead of a chroot.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?7492.1025118456>