| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
Date: Sun, 26 Sep 2004 15:41:53 -0700 From: Matt Zimmerman <mdz@debian.org> To: bugtraq@securityfocus.com Message-ID: <20040926224152.GC4726@alcor.net> Mail-Followup-To: bugtraq@securityfocus.com Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20040920231149.GA1565@openwall.com> On Tue, Sep 21, 2004 at 03:11:49AM +0400, Solar Designer wrote: > On Sat, Sep 18, 2004 at 09:57:19PM +0200, Michal Zalewski wrote: > > Exposure: > > > > Remote root compromise through buffer handling flaws > > FWIW, some (two?) distributions have privsep'ed telnetd by now, where > the immediate impact of this flaw (if it were present there) would be > code execution as pseudo-user "telnetd" chrooted to /var/empty. (*) Debian's telnetd runs as user telnetd, though it does not chroot to /var/empty. -- - mdz
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |