• Skip to main content
  • Skip to primary sidebar

BSDFreaks.nl

For starters and advanced *BSD users

Tags

brand dmi enschede FreeBSD harddisk Hardware Howto's Howto's move new ports server serverruimte universiteit utwente

OpenBSD local root compromise

April 3, 2002 by Rob

Bron: [url=http://online.securityfocus.com]Security Focus[/url]

Er is een bug gevonden in alle versies van OpenBSD waardoor het makkelijk is om root commandos uit te voeren door een willekeurige hacker.

[quote]Program /usr/bin/mail accepts escape sequences while running in
the non-interactive mode. When the attacker inserts the escape sequence
into the stream which is used as an input to the mail command this escape
sequence is interpreted by the mail command and it is possible for example
execute arbitrary commands or read/write any file in the system with the
privileges of the user running /usr/bin/mail.
[/quote]

[url=http://online.securityfocus.com/archive/1/267121]Het hele artikel[/url]

Filed Under: *BSD news from the past

Primary Sidebar

Pages

  • Howto overview
  • iPhone mail setup
  • Links

Categories

  • *BSD news from the past
  • Console
  • Firewall
  • FreeBSD
  • FTP server
  • Hardware
  • Howto's
  • Installation
  • Kernel
  • Mail server
  • Miscellaneous
  • Networking
  • News
  • News imported
  • OpenBSD
  • Operating System
  • Programming
  • Security
  • Site news
  • Software
  • Sysutils
  • Web server

Recent Comments

  • admin on Qmail FreeBSD Mail Toaster Spam en virus control addon
  • admin on [FreeBSD] Het opzetten van een Vlan
  • Jap on [FreeBSD] Installing GlFtpd
  • Jap on [FreeBSD] Installing GlFtpd
  • Crashjuh on Wireless access point met OpenBSD + VPN

Copyright © 2025 · Genesis Sample Theme on Genesis Framework · WordPress · Log in