5668726 2000-11-01 08:05 -0800  /35 rader/ Christopher McCrory <chrismcc@PRICEGRABBER.COM>
Sänt av: joel@lysator.liu.se
Importerad: 2000-11-02  04:38  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: chrismcc@PRICEGRABBER.COM
Mottagare: Bugtraq (import) <13539>
Ärende: Re: Redhat 6.2 dump command executes external program with suid
------------------------------------------------------------
 priviledge
From: Christopher McCrory <chrismcc@PRICEGRABBER.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <3A003F55.D731446D@pricegrabber.com>

Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Hello...

This is the location for the latest version
ftp://ftp.sourceforge.net/pub/sourceforge/dump/

dump is no longer suid root.
	
I tested the short exploit on RedHat7 (dump-0.4b19-4) and was _not_
successful. Redhat7 does not ship dump suid root.  I tested the
exploit on the latest version from sourceforge (dump-0.4b19-1) was
was _not_ successful.  An untested workaround would probably be to
remove the suid bit from /sbin/dump, but I haven't verified it as all
my servers was already running 0.4b19.




--

Christopher McCrory
"The guy that keeps the servers running"
chrismcc@pricegrabber.com
http://www.pricegrabber.com

"Linux: Because rebooting is for adding new hardware"
(5668726) --------------------------------(Ombruten)