Hopefully the BUGTRAQ moderators will catch and delete my first message.
This one has a little more detail.


> ------------------------------------------------------
> From: Joseph Nicholas Yarbrough <[EMAIL PROTECTED]>
>
> I am unable to reproduce this using slackware 7.1(glibc2.1.3).
> What version of slackware were these "others" reporting positive results from?
>

"slackware-current", Slackware's developers release, uses glibc2.2 and is
vulnerable.  After that variable is set, the only two commands I was able
to find that exploited this bug and returned the shadow file are ssh and
traceroute:

$ssh localhost
$traceroute localhost

They do not work if the suid bit is removed.

This does not effect any of Slackware's stable releases.

dentonj

Reply via email to