[14669] in bugtraq
Re: mtr-0.41 root exploit
daemon@ATHENA.MIT.EDU (Kris Kennaway)
Wed Apr 26 01:24:53 2000
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.BSF.4.21.0004241401130.94126-100000@freefall.freebsd.org>
Date: Mon, 24 Apr 2000 14:02:19 -0700
Reply-To: Kris Kennaway <kris@FREEBSD.ORG>
From: Kris Kennaway <kris@FREEBSD.ORG>
X-To: Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <20000424131212.A47167@lubi.freebsd.lublin.pl>
On Mon, 24 Apr 2000, Przemyslaw Frasunek wrote:
> /* (c) 2000 babcia padlina / buffer0verfl0w security (www.b0f.com) */
> /* freebsd mtr-0.41 local root exploit */
Oh, please. This was fixed on
revision 1.21
date: 2000/03/07 23:49:01; author: billf; state: Exp; lines: +10 -10
SECURITY UPGRADE: 0.42 addresses the setuid dropping issues addressed on
BugTraq by Viktor Fougstedt.
----------------------------
after being reported here shortly beforehand. I even released a security
advisory for it.
Kris
----
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe <forsythe@alum.mit.edu>