[29892] in bugtraq
Re: Nokia IPSO Vulnerability
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Thu Apr 24 18:58:52 2003
Message-Id: <200304241743.h3OHhLvj005771@turing-police.cc.vt.edu>
To: Jorge Merlino <jmerlino@easynet.com.uy>
In-Reply-To: Your message of "Thu, 24 Apr 2003 13:32:50 -0300."
<BDEDIPEHKGLOLCOFLHHOCEHACHAA.jmerlino@easynet.com.uy>
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-1104527714P";
micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Thu, 24 Apr 2003 13:43:21 -0400
--==_Exmh_-1104527714P
Content-Type: text/plain; charset=us-ascii
On Thu, 24 Apr 2003 13:32:50 -0300, Jorge Merlino <jmerlino@easynet.com.uy> said:
> I don't think that is a vulnerability.
> The file /etc/master.passwd has read access for all users. Monitor can also
> read it in a ssh session.
1) It being readable to all users *authorized to use the system* is different
from it being readable to any bozo on the entire Internet.
2) /etc/master.password is used as a *Proof of Concept*. Feel free to
substitute any other file that might be more damaging to have. Hmm.. it
might be nice to snarf a copy of /etc/inetd.conf, see what's enabled.. or
maybe I want to grab a copy of.....
--==_Exmh_-1104527714P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQE+qCI5cC3lWbTT17ARAoL3AJ9H3GUEGcBi5IwOe4GXMe8qqPP5kQCgn8JX
XFWCH2r7AuqowQpmpSK2wUo=
=1/Xw
-----END PGP SIGNATURE-----
--==_Exmh_-1104527714P--