Andres Salomon wrote:
>
> Ooops. Mandrake cooker, and Debian unstable. In other words: glibc2.2
> systems. glibc 2.1's resolver (/lib/libnss_db.so.2) appears unaffected.
> This is why some of you aren't seeing it.
>
> ii libc6 2.2-6 GNU C Library: Shared libraries and Timezo
On Tue, 9 Jan 2001 00:11:01 +0100, Wichert Akkerman opined:
> > isn't it a good idea to make an announcement to the
> > effect that at the very least fping should have its setuid root
> > removed?
>
> You might as well remove all suid bits from all apps from your system,
> a reasonably lar
Previously Bob Bernstein wrote:
> Since this vulnerability is now "in the wild," so to speak, due to this
> very discussion, isn't it a good idea to make an announcement to the
> effect that at the very least fping should have its setuid root
> removed?
You might as well remove all suid bits from
Andres Salomon wrote:
>
> Ooops. Mandrake cooker, and Debian unstable. In other words: glibc2.2
> systems. glibc 2.1's resolver (/lib/libnss_db.so.2) appears unaffected.
> This is why some of you aren't seeing it.
>
> ii libc6 2.2-6 GNU C Library: Shared libraries and Timez
On Mon, Jan 08, 2001 at 03:07:26PM -0500, Bob Bernstein wrote:
>
> On Mon, 8 Jan 2001 19:14:53 +0100, Wichert Akkerman opined:
>
> > We're aware of it and looking into this at the moment, as well as
> > checking if there are other similar problems we might have missed.
>
> Since this vulnerabi
On Tue, 9 Jan 2001 00:11:01 +0100, Wichert Akkerman opined:
> > isn't it a good idea to make an announcement to the
> > effect that at the very least fping should have its setuid root
> > removed?
>
> You might as well remove all suid bits from all apps from your system,
> a reasonably la
* Andres Salomon ([EMAIL PROTECTED]) wrote:
> try it w/ traceroute. lotsa fun, and it works
> on mandrake, too.
With sudo is just a hoot, just do sudo no need for password.
Juan Fuentes
Ooops. Mandrake cooker, and Debian unstable. In other words: glibc2.2
systems. glibc 2.1's resolver (/lib/libnss_db.so.2) appears unaffected.
This is why some of you aren't seeing it.
ii libc6 2.2-6 GNU C Library: Shared libraries and Timezone
Previously Bob Bernstein wrote:
> Since this vulnerability is now "in the wild," so to speak, due to this
> very discussion, isn't it a good idea to make an announcement to the
> effect that at the very least fping should have its setuid root
> removed?
You might as well remove all suid bits from
- Original Message -
From: Andres Salomon <[EMAIL PROTECTED]>
To: Kevin <[EMAIL PROTECTED]>
Cc:
Sent: Monday, January 08, 2001 9:37 PM
Subject: Re: 'export RESOLV_HOST_CONF= any file you want' local
vulnerability
> try it w/ traceroute. lotsa fun, and it works
> on mandrake, too.
>
> t
try it w/ traceroute. lotsa fun, and it works
on mandrake, too.
things like this make me glad i don't have to deal w/ untrusted
customers that have shell access...
ii traceroute 1.4a8-1Traces the route taken by packets over a TCP
On Mon, Jan 08, 2001 at 11:13:49AM -0700, Kevin wr
On Mon, 8 Jan 2001 19:14:53 +0100, Wichert Akkerman opined:
> We're aware of it and looking into this at the moment, as well as
> checking if there are other similar problems we might have missed.
Since this vulnerability is now "in the wild," so to speak, due to this
very discussion, isn't it
On Mon, Jan 08, 2001 at 03:07:26PM -0500, Bob Bernstein wrote:
>
> On Mon, 8 Jan 2001 19:14:53 +0100, Wichert Akkerman opined:
>
> > We're aware of it and looking into this at the moment, as well as
> > checking if there are other similar problems we might have missed.
>
> Since this vulnerab
* Andres Salomon ([EMAIL PROTECTED]) wrote:
> try it w/ traceroute. lotsa fun, and it works
> on mandrake, too.
With sudo is just a hoot, just do sudo no need for password.
Juan Fuentes
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL
Ooops. Mandrake cooker, and Debian unstable. In other words: glibc2.2
systems. glibc 2.1's resolver (/lib/libnss_db.so.2) appears unaffected.
This is why some of you aren't seeing it.
ii libc6 2.2-6 GNU C Library: Shared libraries and Timezone
--
To UNSUBSCRIBE, email to
- Original Message -
From: Andres Salomon <[EMAIL PROTECTED]>
To: Kevin <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Monday, January 08, 2001 9:37 PM
Subject: Re: 'export RESOLV_HOST_CONF= any file you want' local
vulnerability
> try it w/ traceroute. lotsa fun, and it works
> on
try it w/ traceroute. lotsa fun, and it works
on mandrake, too.
things like this make me glad i don't have to deal w/ untrusted
customers that have shell access...
ii traceroute 1.4a8-1Traces the route taken by packets over a TCP
On Mon, Jan 08, 2001 at 11:13:49AM -0700, Kevin w
On Mon, Jan 08, 2001 at 11:13:49AM -0700, Kevin wrote:
> When I tried it, I did not get the same results.
Me too, although there are even more different: ping worked fine as without
settting the variable but fping was vulnerable.
bye,
-christian-
--
Christian HammersWESTEND GmbH - Aachen u
Previously thomas lakofski wrote:
> Since I've not had any response yet, I thought I'd give a demonstration of how
> nasty this is:
We're aware of it and looking into this at the moment, as well as
checking if there are other similar problems we might have missed.
Wichert.
--
___
When I tried it, I did not get the same results.
-rwsr-xr-x1 root root19728 Oct 30 1999 /usr/bin/fping*
ldd `which fping`
libc.so.6 => /lib/libc.so.6 (0x00127000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x0011)
ping localhost
PING localhost (127.0.0.1): 5
On Mon, 8 Jan 2001 19:14:53 +0100, Wichert Akkerman opined:
> We're aware of it and looking into this at the moment, as well as
> checking if there are other similar problems we might have missed.
Since this vulnerability is now "in the wild," so to speak, due to this
very discussion, isn't i
Since I've not had any response yet, I thought I'd give a demonstration of how
nasty this is:
Script started on Mon Jan 8 17:48:23 2001
[EMAIL PROTECTED]:~$ export RESOLV_HOST_CONF=/etc/shadow
[EMAIL PROTECTED]:~$ ping localhost
PING localhost (127.0.0.1): 56 data bytes
--- localhost p
Previously thomas lakofski wrote:
> Since I've not had any response yet, I thought I'd give a demonstration of how
> nasty this is:
We're aware of it and looking into this at the moment, as well as
checking if there are other similar problems we might have missed.
Wichert.
--
__
When I tried it, I did not get the same results.
-rwsr-xr-x1 root root19728 Oct 30 1999 /usr/bin/fping*
ldd `which fping`
libc.so.6 => /lib/libc.so.6 (0x00127000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x0011)
ping localhost
PING localhost (127.0.0.1):
On Mon, Jan 08, 2001 at 11:13:49AM -0700, Kevin wrote:
> When I tried it, I did not get the same results.
Me too, although there are even more different: ping worked fine as without
settting the variable but fping was vulnerable.
bye,
-christian-
--
Christian HammersWESTEND GmbH - Aachen
Hai and a jolly new year,
I'm in the process of switching from pmfirewall to ipmasq. I've read
a lot, and now I'm confused:)
I thought rp_filter was supposed to prevent ip spoofing, but ipmasq
still adds rules like:
ipchains -A input -j DENY -i ! lo -s 127.0.0.1/255.0.0.0 -l
ipchains -A in
Since I've not had any response yet, I thought I'd give a demonstration of how
nasty this is:
Script started on Mon Jan 8 17:48:23 2001
thomas@io:~$ export RESOLV_HOST_CONF=/etc/shadow
thomas@io:~$ ping localhost
PING localhost (127.0.0.1): 56 data bytes
--- localhost ping statistics
Hai and a jolly new year,
I'm in the process of switching from pmfirewall to ipmasq. I've read
a lot, and now I'm confused:)
I thought rp_filter was supposed to prevent ip spoofing, but ipmasq
still adds rules like:
ipchains -A input -j DENY -i ! lo -s 127.0.0.1/255.0.0.0 -l
ipchains -A i
Hi,
A friend of mine just tried this against my unstable box and successfully
obtained the contents of /etc/shadow.
I imagine that this is a problem in libc -- I'll leave it to
[EMAIL PROTECTED] to file bug reports.
cheers,
Thomas
--
who's watching your watchmen?
gpg: pub 1024D/81FD
Hi,
A friend of mine just tried this against my unstable box and successfully
obtained the contents of /etc/shadow.
I imagine that this is a problem in libc -- I'll leave it to
[EMAIL PROTECTED] to file bug reports.
cheers,
Thomas
--
who's watching your watchmen?
gpg: pub 1024D/81F
I found a good solution for my problem...
I copied the compiled ELF file of gnupg (/usr/bin/gpg) to $HOME/bin
Then I copied the libraries it needs to $HOME/lib
Created ~/.gnupg/ and copied pubring.gpg into it
So, to execute gnupg I need to set up the variable to look for libraries in a
n
I found a good solution for my problem...
I copied the compiled ELF file of gnupg (/usr/bin/gpg) to $HOME/bin
Then I copied the libraries it needs to $HOME/lib
Created ~/.gnupg/ and copied pubring.gpg into it
So, to execute gnupg I need to set up the variable to look for libraries in a n
32 matches
Mail list logo