SECURITY BUG IN INTERACTIVE UNIX SYSV386
Joern Lubkoll
lumpi at dobag.in-berlin.de
Wed Feb 13 09:51:45 AEST 1991
jtc at motcad.portal.com (J.T. Conklin) writes:
>In article <1991Feb11.184130.11321 at jwt.UUCP> john at jwt.UUCP (John Temples) writes:
>>In article <KR3NBQQ at dobag.in-berlin.de> lumpi at dobag.in-berlin.de (Joern Lubkoll) writes:
>>>it seems that your very cute interactive unix System has a nice bug !
>>
>>Yikes. This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>>*with* a coprocessor. It failed on Microport 2.2 with a coprocessor.
>>
>>Now, the question is, what do we do to protect ourselves in the meantime?
>If I remember correctly, Sun Microsystems sent out a fixed version of
>sendmail to its customer base free of charge the week after the Internet
>Worm Attack. I see no reason why we should expect less from the i386
>UNIX vendors. In my opinion, any vendor that doesn't respond to this
>problem with the attention it is due, doesn't deserve to be in business.
so mote it be ... says me :-)
jl
--
lumpi at dobag.in-berlin.de -- "Nothing is the complete absence of everything."
More information about the Comp.unix.sysv386
mailing list