[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Re: Remote Root Hole in FreeBSD Ports
From: networkingysistemas networkingysistemas xxx <rdelcampo () airtel ! net>
Date: 2001-12-29 9:41:02
[Download RAW message or body]
----- Mensaje original -----
> This notice is in reference to a reported root hole in the FreeBSD port of
> perdition and more specifically the library vanessa_logger that it
> requires.
>
> http://www.securityfocus.org/archive/1/247148
>
> First I would like to express great dismay that this was published on a
> public list (BugTraq) without prior consultation with the author (myself)
> or to my knowledge the maintainer of the FreeBSD port, Konstantinos
> Konstantinidis.
>
> There is a string format bug in vanessa_logger 0.0.1 which is what the post
> to BugTraq makes reference to. FreeBSD, was at the time of the posting
> shipping this vulnerable version.
>
> vanessa_logger 0.0.2, released on the 29th of June 2001, is not vulnerable
> to this exploit. FreeBSD have released a patched version of vanessa_logger
> 0.0.1 which is also not vulnerable. Users should upgrade to either of
> these.
>
> vanessa_logger 0.0.2 is available from
> ftp://ftp.vergenet.net/pub/vanessa/vanessa_logger/0.0.2
>
> At this time I would also like to highlight the importance of running
> perdition as a non-root user. The --username and --group options enable
> perdition to run as non-root for most of a processes life. If these options
> are used then the potential risk from any exploits stemming from the string
> format bug in vanessa_logger are significantly reduced.
>
> For more information on perdition please see
> http://vergenet.net/linux/perdition/
>
> --
> Horms
> Author of perdition and vanessa_logger
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic