I just installed this patch and noticed a major omission in the instructions
for the installation of the patch.
Here are the instructions from the README:
# cd /usr/dt/bin
# cp /patches/dtaction dtaction.new
# chown root:system dtaction.new
# chmod 6555 dtaction.new
# ln dtaction dtaction.orig
#
Greetings,
/usr/bin/sccw, suid root by default on SuSE 6.2, allows any user to
read any file on the system. Sort of. Well, it's enough to read the
text of almost anything. In capitals. Without punctuation. Check it
out:
xnec@susebox:/tmp > id
uid=1001(xnec) gid=100(users) groups=100(use
-Original Message-
From: CERT Advisory <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
Date: Thursday, September 16, 1999 9:54 PM
Subject: CERT Advisory CA-99.12 - Buffer Overflow in amd
>-BEGIN PGP SIGNED MESSAGE-
>
>CERT Advisory CA-99-12 Buffer Overflow in amd
>
On Tue, 14 Sep 1999, Crispin Cowan wrote:
> (post sent as HTML and ASCII because there's a table that's easier to read
> in HTML. Aleph, go ahead and nuke the HTML if you prefer)
Urg. Pine happily munged it on reply:
> The result looks like this:
>
> Interface
Here's a couple of reasons to upgrade packages. All of these have been
reported to respective developers, and all but the sshd DOS attack have
fixes. I'm not guaranteeing that exploits are possible for all of these,
but they do look fairly dangerous.
I'd originally sent a message with this info
Since I didn't see any of this mentioned in any of the archieved WWWBoard
articles from bugtraq, I decidied to send it in.
Possible Compromise: Remote Administration of WWWBoard.
---
By following WWWBoards install instructions exactly, you can
-- Forwarded message --
Date: Fri, 17 Sep 1999 12:32:01 -0400 (EDT)
From: Brian F. Feldman <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: socket buffer DoS/administrative limits
Yes folks, it's that time again: time for more administrative limits!
I've worked out a resource
Before I release the exploit, I'd like to give people a chance to fix
the problem. Here's the patch. Note that there are other potential
problems; I've been in contact with MacGyver and a new version fixing
this and other stuff should be out within a few days (at this point I
really have no clue
SCO is working on investigating and fixing the recent
vulnerabilities reported here (namely the 19 buffer
overflows, Xt and lpr exploits). We will have a patch
for OpenServer 5.0.5 in two weeks, which will be available
from http://www.sco.com/security/.
Thanks,
Michael Almond
Team Lead, SCO Ope