[15042] in bugtraq
Re: kscd vulnerability
daemon@ATHENA.MIT.EDU (Matt Wilson)
Thu May 25 05:16:10 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id: <20000524165620.Z28058@devserv.devel.redhat.com>
Date: Wed, 24 May 2000 16:56:20 -0400
Reply-To: Matt Wilson <msw@REDHAT.COM>
From: Matt Wilson <msw@REDHAT.COM>
X-To: Sebastian <krahmer@CS.UNI-POTSDAM.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <Pine.LNX.3.96.1000516113744.514A-101000@ati15.cs.uni-potsdam.de>; from krahmer@CS.UNI-POTSDAM.DE on Tue,
May 16, 2000 at 11:42:23AM +0200
Red Hat Linux does not ship kscd setuid.
Matt
On Tue, May 16, 2000 at 11:42:23AM +0200, Sebastian wrote:
> good morning,
>
> sorry for not sending an advisory, but i don't
> have much time. :)
> I think the exploit is well commented.
>
> regards,
> Sebastian
>
> mail: Permission denied. Detected symlink to /etc/ld.so.preload.
> Admin has been informed.
> [exploit_user@lucifer]$ /tmp/boomshell
> [root@lucifer]#
>