Re: Vulnerability in dtaction on Digital Unix

1999-09-17 Thread Eric Gatenby
I just installed this patch and noticed a major omission in the instructions for the installation of the patch. Here are the instructions from the README: # cd /usr/dt/bin # cp /patches/dtaction dtaction.new # chown root:system dtaction.new # chmod 6555 dtaction.new # ln dtaction dtaction.orig #

SuSE 6.2 /usr/bin/sccw read any file

1999-09-17 Thread Brock Tellier
Greetings, /usr/bin/sccw, suid root by default on SuSE 6.2, allows any user to read any file on the system. Sort of. Well, it's enough to read the text of almost anything. In capitals. Without punctuation. Check it out: xnec@susebox:/tmp > id uid=1001(xnec) gid=100(users) groups=100(use

Fw: CERT Advisory CA-99.12 - Buffer Overflow in amd

1999-09-17 Thread morex
-Original Message- From: CERT Advisory <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] <[EMAIL PROTECTED]> Date: Thursday, September 16, 1999 9:54 PM Subject: CERT Advisory CA-99.12 - Buffer Overflow in amd >-BEGIN PGP SIGNED MESSAGE- > >CERT Advisory CA-99-12 Buffer Overflow in amd >

Re: fixing all buffer overflows --- random magin numbers

1999-09-17 Thread Oliver Xymoron
On Tue, 14 Sep 1999, Crispin Cowan wrote: > (post sent as HTML and ASCII because there's a table that's easier to read > in HTML. Aleph, go ahead and nuke the HTML if you prefer) Urg. Pine happily munged it on reply: > The result looks like this: > > Interface

A few bugs...

1999-09-17 Thread Tymm Twillman
Here's a couple of reasons to upgrade packages. All of these have been reported to respective developers, and all but the sshd DOS attack have fixes. I'm not guaranteeing that exploits are possible for all of these, but they do look fairly dangerous. I'd originally sent a message with this info

More fun with WWWBoard

1999-09-17 Thread David Weins
Since I didn't see any of this mentioned in any of the archieved WWWBoard articles from bugtraq, I decidied to send it in. Possible Compromise: Remote Administration of WWWBoard. --- By following WWWBoards install instructions exactly, you can

socket buffer DoS/administrative limits (fwd)

1999-09-17 Thread Brian F. Feldman
-- Forwarded message -- Date: Fri, 17 Sep 1999 12:32:01 -0400 (EDT) From: Brian F. Feldman <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: socket buffer DoS/administrative limits Yes folks, it's that time again: time for more administrative limits! I've worked out a resource

proftpd 1.2.0pre6 patch

1999-09-17 Thread Tymm Twillman
Before I release the exploit, I'd like to give people a chance to fix the problem. Here's the patch. Note that there are other potential problems; I've been in contact with MacGyver and a new version fixing this and other stuff should be out within a few days (at this point I really have no clue

Re: recent SCO 5.0.x vulnerabilities

1999-09-17 Thread Michael Almond
SCO is working on investigating and fixing the recent vulnerabilities reported here (namely the 19 buffer overflows, Xt and lpr exploits). We will have a patch for OpenServer 5.0.5 in two weeks, which will be available from http://www.sco.com/security/. Thanks, Michael Almond Team Lead, SCO Ope