[4589] in linux-net channel archive

home help back first fref pref prev next nref lref last post

Re: A SERIOUS security problem!!!!

daemon@ATHENA.MIT.EDU (Alan Cox)
Mon Sep 30 11:41:36 1996

From: Alan Cox <alan@cymru.net>
To: brian@lantz.com (Brian A. Lantz)
Date: 	Mon, 30 Sep 1996 10:16:48 +0100 (BST)
Cc: linux-net@vger.rutgers.edu, torvalds@cs.helsinki.fi
In-Reply-To: <Pine.LNX.3.91.960929141949.27279B-100000@lantz.com> from "Brian A. Lantz" at Sep 29, 96 04:01:20 pm

> This uses a security hole in telnetd, which allows passing of environment 
> variables into 'login'. They define 'LD_LIBRARY_PATH' to point to a user 
> (or incoming ftp) directory containing a new 'libc.so.4' or a 
> 'libroot.so' (also supplied in the cracker's kit), which contains NO 
> security checking, and logs them in as root.

Yawn. If you followed any security list (even cert announce) you'd know this
problem across multiple architectures was reported and fixed over a year ago

Alan

home help back first fref pref prev next nref lref last post