[29892] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Nokia IPSO Vulnerability

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Thu Apr 24 18:58:52 2003

Message-Id: <200304241743.h3OHhLvj005771@turing-police.cc.vt.edu>
To: Jorge Merlino <jmerlino@easynet.com.uy>
In-Reply-To: Your message of "Thu, 24 Apr 2003 13:32:50 -0300."
             <BDEDIPEHKGLOLCOFLHHOCEHACHAA.jmerlino@easynet.com.uy> 
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-1104527714P";
	 micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Thu, 24 Apr 2003 13:43:21 -0400

--==_Exmh_-1104527714P
Content-Type: text/plain; charset=us-ascii

On Thu, 24 Apr 2003 13:32:50 -0300, Jorge Merlino <jmerlino@easynet.com.uy>  said:
> I don't think that is a vulnerability.
> The file /etc/master.passwd has read access for all users. Monitor can also
> read it in a ssh session.

1) It being readable to all users *authorized to use the system* is different
from it being readable to any bozo on the entire Internet.

2) /etc/master.password is used as a *Proof of Concept*.  Feel free to
substitute any other file that might be more damaging to have.  Hmm.. it
might be nice to snarf a copy of /etc/inetd.conf, see what's enabled.. or
maybe I want to grab a copy of.....



--==_Exmh_-1104527714P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQE+qCI5cC3lWbTT17ARAoL3AJ9H3GUEGcBi5IwOe4GXMe8qqPP5kQCgn8JX
XFWCH2r7AuqowQpmpSK2wUo=
=1/Xw
-----END PGP SIGNATURE-----

--==_Exmh_-1104527714P--

home help back first fref pref prev next nref lref last post