The debian-private mailing list leak, part 1. Volunteers have complained about Blackmail. Lynchings. Character assassination. Defamation. Cyberbullying. Volunteers who gave many years of their lives are picked out at random for cruel social experiments. The former DPL's girlfriend Molly de Blanc is given volunteers to experiment on for her crazy talks. These volunteers never consented to be used like lab rats. We don't either. debian-private can no longer be a safe space for the cabal. Let these monsters have nowhere to hide. Volunteers are not disposable. We stand with the victims.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: smbmount root exploit



You're right. But I couldn't use the exploit despite making smbmount
setuid root!

Michael
--
Dr. Michael Meskes, Projekt-Manager    | topystem Systemhaus GmbH
meskes@topsystem.de                    | Europark A2, Adenauerstr. 20
meskes@debian.org                      | 52146 Wuerselen
Go SF49ers! Use Debian GNU/Linux!      | Tel: (+49) 2405/4670-44

>----------
>Von: 	Austin Donnelly[SMTP:austin@greenend.org]
>Gesendet: 	Samstag, 28. Juni 1997 16:24
>An: 	Michael Meskes
>Cc: 	security@debian.org
>Betreff: 	RE: smbmount root exploit
>
>On Thu, 26 Jun 1997, Michael Meskes wrote:
>
>> I cannot get anything but a segmentation fault from using this program.
>> Did anyone have more luck. Besides it seems we're not vulnerable at all.
>> At least my smbmount is not setuid root.
>
>It's often the case that if you can cause a program to segfault, then
>you can also cause it to execute your (malicious) code.  However, if
>it really isn't setuid on Debian by default, then I can't see any
>urgent risk.  It would still be good to fix, however.
>
>Austin
>


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-private-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .