[14669] in bugtraq

home help back first fref pref prev next nref lref last post

Re: mtr-0.41 root exploit

daemon@ATHENA.MIT.EDU (Kris Kennaway)
Wed Apr 26 01:24:53 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.BSF.4.21.0004241401130.94126-100000@freefall.freebsd.org>
Date:         Mon, 24 Apr 2000 14:02:19 -0700
Reply-To: Kris Kennaway <kris@FREEBSD.ORG>
From: Kris Kennaway <kris@FREEBSD.ORG>
X-To:         Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000424131212.A47167@lubi.freebsd.lublin.pl>

On Mon, 24 Apr 2000, Przemyslaw Frasunek wrote:

> /* (c) 2000 babcia padlina / buffer0verfl0w security (www.b0f.com) */
> /* freebsd mtr-0.41 local root exploit */

Oh, please. This was fixed on

revision 1.21
date: 2000/03/07 23:49:01;  author: billf;  state: Exp;  lines: +10 -10
SECURITY UPGRADE: 0.42 addresses the setuid dropping issues addressed on
BugTraq by Viktor Fougstedt.
----------------------------

after being reported here shortly beforehand. I even released a security
advisory for it.

Kris

----
In God we Trust -- all others must submit an X.509 certificate.
    -- Charles Forsythe <forsythe@alum.mit.edu>

home help back first fref pref prev next nref lref last post