[21317] in bugtraq
Re: smbd remote file creation vulnerability
daemon@ATHENA.MIT.EDU (Dan Stromberg)
Tue Jul 3 13:04:39 2001
Date: Mon, 2 Jul 2001 14:28:04 -0700
From: Dan Stromberg <strombrg@nis.acs.uci.edu>
To: Christopher William Palow <cwp@andrew.cmu.edu>
Cc: bugtraq@securityfocus.com
Message-ID: <20010702142804.Z1235@seki.acs.uci.edu>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
protocol="application/pgp-signature"; boundary="Cx6gHIjlhIvUM2fk"
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.21L-021.0107021108330.1654-100000@unix45.andrew.cmu.edu>; from cwp@andrew.cmu.edu on Mon, Jul 02, 2001 at 11:15:29AM -0400
--Cx6gHIjlhIvUM2fk
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Mon, Jul 02, 2001 at 11:15:29AM -0400, Christopher William Palow wrote:
> what machines does this really effect? Those running samba and AFS,
> mainly educational institutions or other large institutions.
=2E..or systems with NFS configured with /net. Probably easier to find,
and wouldn't require creation on a machine the attacked system trusts
- any old NFS server on the internet should do then if /net is
configured.
--=20
Dan Stromberg UCI/NACS/DCS
--Cx6gHIjlhIvUM2fk
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE7QOdjo0feVm00f/8RAlSLAJ0UQp/QZze1AMhBnC+1J5z87uK2XACfZIdq
Inb0zArw//D7r3J45cCqLqo=
=Tcjc
-----END PGP SIGNATURE-----
--Cx6gHIjlhIvUM2fk--