[14198] in bugtraq
Re: Corel Linux 1.0 dosemu default configuration: Local root vuln
daemon@ATHENA.MIT.EDU (VaMPiRe, WHiTe)
Tue Mar 7 10:18:21 2000
Mail-Followup-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="vOmOzSkFvhd7u8Ms"
Message-Id: <20000303025417.C1413@nirvana.projectgamma.com>
Date: Fri, 3 Mar 2000 02:54:17 -0500
Reply-To: whitevampire@mindless.com
From: "VaMPiRe, WHiTe" <whitvamp@MINDLESS.COM>
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <200003020436.PAA20168@jawa.chilli.net.au>; from suid@SUID.KG on
Thu, Mar 02, 2000 at 04:47:11AM +0000
--vOmOzSkFvhd7u8Ms
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
On Thu, Mar 02, 2000 at 04:47:11AM +0000, suid@SUID.KG(suid@SUID.KG) wrote:
<snip>
: Summary:
:=20
: Local users can take advantage of a packaging and configuration
: error (which has been known and documented for a long time) to
: execute arbitrary commands as root.
:=20
: We see from the doc/README/SECURITY file as well as
: http://www.dosemu.org/docs/README/0.98/README-3.html
: written in 1997 that this configuration is bad.
<snip>
Tested default configuration of dosemu on Slackware 7.0, no
vulnerability.
Regards,
--=20
__ ______ ____
/ \ / \ \ / / WHiTe VaMPiRe\Rem
\ \/\/ /\ Y / whitevampire@mindless.com
\ / \ / http://www.projectgamma.com/
\__/\ / \___/ http://www.gammaforce.org/
\/ "Silly hacker, root is for administrators."
--vOmOzSkFvhd7u8Ms
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.1
iQA/AwUBOL9vp9/q8ZpxA8pfEQKkdwCgwh68tX6NWe21l9JLkhIb3JEtAn4AnAtR
Frbg9nvoZiReJxpso6qhQu2w
=D8oK
-----END PGP SIGNATURE-----
--vOmOzSkFvhd7u8Ms--