[13132] in bugtraq
Re: majordomo local exploit
daemon@ATHENA.MIT.EDU (Christopher Schulte)
Wed Dec 29 09:17:33 1999
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Message-Id: <4.3.0.23.19991229005120.015b6038@pop.schulte.org>
Date: Wed, 29 Dec 1999 00:54:35 -0600
Reply-To: Christopher Schulte <christopher@SCHULTE.ORG>
From: Christopher Schulte <christopher@SCHULTE.ORG>
X-To: Brock Tellier <btellier@USA.NET>, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <19991229024744.23364.qmail@nwcst292.netaddress.usa.net>
At 08:47 PM 12/28/1999 -0600, Brock Tellier wrote:
>I've only tested the version of majordomo which comes with UnixWare
>7.1 which is 1.94.4. This vulnerability may or not still be present
>in newer versions of majordomo, but it exists on the default UW7.1
>installation.
Confirmed with *stock* download of 1.94.4 source (according to
http://www.greatcircle.com/majordomo/, this is the current version) from
main distro site.
--
Christopher Schulte
christopher@schulte.org
http://www.schulte.org/