[13132] in bugtraq

home help back first fref pref prev next nref lref last post

Re: majordomo local exploit

daemon@ATHENA.MIT.EDU (Christopher Schulte)
Wed Dec 29 09:17:33 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Message-Id:  <4.3.0.23.19991229005120.015b6038@pop.schulte.org>
Date:         Wed, 29 Dec 1999 00:54:35 -0600
Reply-To: Christopher Schulte <christopher@SCHULTE.ORG>
From: Christopher Schulte <christopher@SCHULTE.ORG>
X-To:         Brock Tellier <btellier@USA.NET>, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <19991229024744.23364.qmail@nwcst292.netaddress.usa.net>

At 08:47 PM 12/28/1999 -0600, Brock Tellier wrote:

 >I've only tested the version of majordomo which comes with UnixWare
 >7.1 which is 1.94.4.  This vulnerability may or not still be present
 >in newer versions of majordomo, but it exists on the default UW7.1
 >installation.

Confirmed with *stock* download of 1.94.4 source (according to
http://www.greatcircle.com/majordomo/, this is the current version) from
main distro site.

--
Christopher Schulte
christopher@schulte.org
http://www.schulte.org/

home help back first fref pref prev next nref lref last post