On Thu, Jan 11, 2001 at 01:42:52AM +0200, Ari Saastamoinen wrote:

> On Wed, 10 Jan 2001, Pedro Margate wrote:
> 
> > install the ssh binary as suid root by default.  This can be disabled
> > during configuration or after the fact with chmod.  I believe that would
> 
> That exploit can use any suid root program which resolves host names. (For
> example ping and traceroute) So you cannot fix that glibc explot only by
> unsetting SUID bit of ssh client.

Or more properly, an suid root program which resolves host names _while still
holding root privileges_.  ping from netkit and traceroute from LBNL do not
fall into this category.  fping from SATAN, however, does.

-- 
 - mdz

PGP signature

Reply via email to