5668726 2000-11-01 08:05 -0800 /35 rader/ Christopher McCrory <chrismcc@PRICEGRABBER.COM> Sänt av: joel@lysator.liu.se Importerad: 2000-11-02 04:38 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: chrismcc@PRICEGRABBER.COM Mottagare: Bugtraq (import) <13539> Ärende: Re: Redhat 6.2 dump command executes external program with suid ------------------------------------------------------------ priviledge From: Christopher McCrory <chrismcc@PRICEGRABBER.COM> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <3A003F55.D731446D@pricegrabber.com> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Hello... This is the location for the latest version ftp://ftp.sourceforge.net/pub/sourceforge/dump/ dump is no longer suid root. I tested the short exploit on RedHat7 (dump-0.4b19-4) and was _not_ successful. Redhat7 does not ship dump suid root. I tested the exploit on the latest version from sourceforge (dump-0.4b19-1) was was _not_ successful. An untested workaround would probably be to remove the suid bit from /sbin/dump, but I haven't verified it as all my servers was already running 0.4b19. -- Christopher McCrory "The guy that keeps the servers running" chrismcc@pricegrabber.com http://www.pricegrabber.com "Linux: Because rebooting is for adding new hardware" (5668726) --------------------------------(Ombruten)