[7109] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Vulnerability in 4.4BSD Secure Levels Implementation

daemon@ATHENA.MIT.EDU (Roger Harrison ?)
Tue Jun 30 11:29:40 1998

Date: 	Mon, 29 Jun 1998 20:57:37 -0400
Reply-To: Roger Harrison ? <rharri01@KEPLER.POLY.EDU>
From: Roger Harrison ? <rharri01@KEPLER.POLY.EDU>
X-To:         Niall Smart <njs3@DOC.IC.AC.UK>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <E0yqR9w-0007Pv-00@oak67.doc.ic.ac.uk>

On Mon, 29 Jun 1998, Niall Smart wrote:

> On Jun 26,  8:41am, Tim Newsham wrote:
> } Subject: Re: Vulnerability in 4.4BSD Secure Levels Implementation
> > >
> > >  - The syslogd daemon can be covertly compromised, so no useful
> > >    information ever gets logged to the protected system logs.  But at
> > >    least no-one can modify the useless information.
> >
> > Be smart, niall, syslog can only be compromised after the system
> > has been compromised.

uhm, not necessarily.
The pinelock.csh script I wrote around 12/97 and posted to bugtraq
could kill syslogd if root opens up two sessions of pine.
It is a local exploit.

http://kepler.poly.edu/~rharri01
iconoclast@thepentagon.com

-Iconoclast

home help back first fref pref prev next nref lref last post