Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 18 Jan 2000 00:46:05 -0600 (CST)
From:      James Wyatt <jwyatt@rwsystems.net>
To:        Keith Stevenson <k.stevenson@louisville.edu>
Cc:        Omachonu Ogali <oogali@intranova.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: sh?
Message-ID:  <Pine.BSF.4.10.10001180041560.95375-100000@bsdie.rwsystems.net>
In-Reply-To: <20000117144129.B85360@osaka.louisville.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 17 Jan 2000, Keith Stevenson wrote:
> On Mon, Jan 17, 2000 at 02:28:07PM -0500, Omachonu Ogali wrote:
> > On all systems.
> > 
> > Take a look at some shellcode in the most recent exploits, they either
> > bind /bin/sh to a port via inetd or execute some program using /bin/sh.
> 
> So?
	[ ... ]
> $ uname -a
> AIX athena 3 4 00002F0E4C00
> 
> $ ls -l /bin/sh
> -r-xr-xr-x   4 bin      bin       240326 Dec 02 17:27 /bin/sh

Of course, on AIX it is really /usr/bin/ksh (as is /bin/{tsh,psh}) and you
can use some ksh grammar in it. It ignores some ksh stuff, though - Jy@



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.10001180041560.95375-100000>