[16439] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Advisory: mgetty local compromise

daemon@ATHENA.MIT.EDU (Chris L. Mason)
Wed Aug 30 15:06:21 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id:  <20000829155810.A27454@unixzone.com>
Date:         Tue, 29 Aug 2000 15:58:11 -0400
Reply-To: "Chris L. Mason" <cmason@UNIXZONE.COM>
From: "Chris L. Mason" <cmason@UNIXZONE.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <4.3.1.2.20000826015347.00b8e220@pop.crosswinds.net>; from
              satan@FASTDIAL.NET on Sat, Aug 26, 2000 at 02:23:05AM -0400

On Sat, Aug 26, 2000 at 02:23:05AM -0400, Stan Bubrouski wrote:
...
>
> Believed to be vulnerable:
>
...
> OpenBSD 2.7? (mgetty is included in ports packages)


Looks like someone else realized this at least a couple weeks ago.

$ make
===>  mgetty-1.1.21 is marked as broken: insecure tempfile handling: can
overwrite any file on the system.

The cvs log shows:

----------------------------
revision 1.17
date: 2000/08/15 19:38:18;  author: brad;  state: Exp;  lines: +2 -2
even better reason why this should be marked BROKEN,
insecure tempfile handling: can overwrite any file on the system
----------------------------

I'm sure this will be updated to 1.1.22 after an audit is done.  :)


Chris

home help back first fref pref prev next nref lref last post