SECURITY BUG IN INTERACTIVE UNIX SYSV386
Wm E. Davidsen Jr
davidsen at sixhub.UUCP
Mon Feb 18 14:34:34 AEST 1991
In article <1991Feb15.134715.16979 at virtech.uucp> cpcahil at virtech.uucp (Conor P. Cahill) writes:
| 2. I wholeheartly DISAGREE with you posting the source code which
| performs the security bypass. You could have just posted the
| uuencoded binary which would have been enough to prove your point
| without making it extremely easy for any two bit user to obtain
| privileged access.
How is the uuencoded binary less dangerous than the source? Once you
can write the passwd and shadow files you can either make your login
root, change the root passwd, create a new root userid, etc.
I don't see in this case what would have been gained by giving the
hacker a way to do it and not telling him how.
--
bill davidsen - davidsen at sixhub.uucp (uunet!crdgw1!sixhub!davidsen)
sysop *IX BBS and Public Access UNIX
moderator of comp.binaries.ibm.pc and 80386 mailing list
"Stupidity, like virtue, is its own reward" -me
More information about the Comp.unix.sysv386
mailing list