[3641] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Serious hole in Solaris 2.5[.1] gethostbyname() (exploit

daemon@ATHENA.MIT.EDU (Mike Battersby)
Tue Nov 19 03:30:28 1996

Date: 	Tue, 19 Nov 1996 15:07:50 +1100
Reply-To: Mike Battersby <mib@deakin.edu.au>
From: Mike Battersby <mib@deakin.edu.au>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
In-Reply-To:  Your message of "Tue, 19 Nov 1996 16:01:27 +1300."
              <199611190301.QAA12823@ccu1.auckland.ac.nz>

Russell Street writes:
> > with patch level 103615-01 and up. Try backing out of that patch and it
> I have a 2.5 machines (SS4, SS10) that is vunerable.  It has no patches at

Our 2.5.1 machines don't have that patch installed.  They're vulnerable
with:

        hosts: dns
or      hosts: dns files

in nsswitch.conf, but as soon as you add "nis" in there the exploit program
just sends things into an infinite loop (it appears).

 - Mike

--
|   Mike Battersby                        |   mike@starbug.bofh.asn.au        |
|   http://www.deakin.edu.au/~mib/        |   mib@deakin.edu.au               |

home help back first fref pref prev next nref lref last post