[prev in list] [next in list] [prev in thread] [next in thread]
List: freebsd-security
Subject: Re: HP automountd security bulletin (fwd)
From: Cy Schubert - ITSD Open Systems Group <Cy.Schubert () uumail ! gov ! bc ! ca>
Date: 1999-10-27 1:58:03
[Download RAW message or body]
In message <Pine.LNX.3.96.991026174725.25403D-100000@petra.hos.u-szeged.hu>, Ad
am Szilveszter writes:
> Hi!
>
> I am not an expert but I would like to ask if we are vulnerable to this
> amd problem I got news about the other day...
I would think that amd could be vulnerable because it supports
program filesystem (type:=program). This is not exactly the same as
automountd's executable maps, but I suspect it could be exploited in
some way because amd executes an external program to actually perform
mounts/unmounts. The following amd patch disables program maps.
--- src/usr.sbin/amd/include/config.h.orig Sun Aug 29 08:39:16 1999
+++ src/usr.sbin/amd/include/config.h Mon Oct 25 23:42:20 1999
@@ -35,7 +35,7 @@
#define HAVE_AM_FS_INHERIT 1
/* Define if have program filesystem */
-#define HAVE_AM_FS_PROGRAM 1
+/* #undef HAVE_AM_FS_PROGRAM */
/* Define if have symbolic-link filesystem */
#define HAVE_AM_FS_LINK 1
Regards, Phone: (250)387-8437
Cy Schubert Fax: (250)387-5766
Sun/DEC Team, UNIX Group Internet: Cy.Schubert@uumail.gov.bc.ca
ITSD Cy.Schubert@gems8.gov.bc.ca
Province of BC
"e**(i*pi)+1=0"
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic