The debian-private mailing list leak, part 1. Volunteers have complained about Blackmail. Lynchings. Character assassination. Defamation. Cyberbullying. Volunteers who gave many years of their lives are picked out at random for cruel social experiments. The former DPL's girlfriend Molly de Blanc is given volunteers to experiment on for her crazy talks. These volunteers never consented to be used like lab rats. We don't either. debian-private can no longer be a safe space for the cabal. Let these monsters have nowhere to hide. Volunteers are not disposable. We stand with the victims.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [linux-security] Announce: chkexploit 1.13 (fwd)



It seems this script is not up-to-date at all. Here's a list of all
vulnerabilities it thinks it found on my machine:

>smrsh: VULNERABLE
>  Problem: Local users can use .forward to exec programs.
>  Fix: replace /bin/sh by smrsh as your program mailer.
>
>dosemu: VULNERABLE
>  Problem: Local users can read any file on the system.
>  Fix: Remove SUID bit.

I don't know if these still hold.

>resolv: VULNERABLE
>  Problem: Local users may read any file on the system.
>  Fix: Upgrade to a Linux libc 5.4.7 or greater.
>
>nlspath: VULNERABLE
>  Problem: Local users can get root access.
>  Fix: Upgrade to a Linux libc 5.4.x or greater.

I run 5.4.33 so this is stupid. It seems they cannot cope with more than
one libc.

>ftpd: VULNERABLE
>  Problem: Non-local users may gain access to the system.
>  Fix: Download and install the latest version of ftpd.

I do have the latest version of wu-ftpd. Don't know why it moans here.

>small_services: VULNERABLE
>  Problem: Non-local users can crash your machine.
>  Fix: Turn off echo, discard, daytime, chargen and time from
/etc/inetd.conf.

Yup, some of these are enabled by default.

>at: VULNERABLE
>  Problem: Local users may gain root access.
>  Fix: chmod 700 /var/spool/atjobs and upgrade the 'at'
>       command to version 2.7 or newer.

I do run the latest version which is higher than 2.7 and the permissions
are correct, too.

>dump: VULNERABLE
>  Problem: Local users can get root access.
>  Fix: remove the SUID bit.

Does this still hold?

>elm: VULNERABLE
>  Problem: Local users can gain mail group access.
>  Fix: Remove SGID bit or install elm newer than 2.4 PL25.

I guess they got confused by elm naming scheme. :-)

>suid_rw_partitions: VULNERABLE
>  Problem: Local users can create and exec suid binaries.
>  Fix: Mount public writable partitions with nosuid option.

Could anyone tell me how this could be achived?

>zgv: VULNERABLE
>  Problem: Local users can get root access.
>  Fix: remove the SUID bit.

>lynx: VULNERABLE
>  Problem: Local users can execute arbitrary commands.
>  Fix: Install a patch from http://www.crl.com/~subir/lynx.html.

>request_route: VULNERABLE
>  Problem: Local users may overwrite any file on the system.
>  Fix: remove /sbin/request-route.

Didn't we have a fix for these?


Michael

--
Dr. Michael Meskes, Project-Manager    | topsystem Systemhaus GmbH
meskes@topsystem.de                    | Europark A2, Adenauerstr. 20
meskes@debian.org                      | 52146 Wuerselen
Go SF49ers! Go Rhein Fire!             | Tel: (+49) 2405/4670-44
Use Debian GNU/Linux!                  | Fax: (+49) 2405/4670-10

> -----Original Message-----
> From:	Christian Hudon [SMTP:S1205299.ber@student.goethe.de]
> Sent:	Monday, September 15, 1997 7:05 PM
> To:	security@debian.org
> Subject:	[linux-security] Announce: chkexploit 1.13 (fwd)
> 
> I don't have access to a Debian machine these days, but could someone
> try
> out the following on a Debian 1.3.1 + bo-updates machine (or has
> Debian
> 1.3.1r1 been released?) and report the results (both as bug reports
> and in
> a message to security@debian.org).
> 
> It'd probably also be a good idea to run each version of this program
> against the latest Debian... 
> 
> Thanks,
> 
>   Christian
> 
> ---------- Forwarded message ----------
> Date: Wed, 03 Sep 1997 16:47:07 -0300
> From: Klaus Steding-Jessen <jessen@ahand.unicamp.br>
> To: linux-security@redhat.com
> Subject: [linux-security] Announce: chkexploit 1.13
> 
>         chkexploit 1.13 is now available, see lsm below.  There are
> some bugfixes from version 1.12 and tests for new exploits:
> 
> * lynx;
> * smbmount;
> * request-route.
> 
> Begin3
> Title:          chkexploit
> Version:        1.13
> Entered-date:   31AUG97
> Description:    Check the system for vulnerabilities to some publicly
>                 available exploits.
> Keywords:       security exploits vulnerabilities
> Author:         jessen@ahand.unicamp.br (Klaus Steding-Jessen)
>                 nelson@pangeia.com.br   (Nelson Murilo)
>                 vazquez@iqm.unicamp.br  (Pedro A M Vazquez)
> Maintained-by:  
> Primary-site:   ftp.pangeia.com.br /pub/pub/seg/pac
>                 10kB chkexploit-1.13.tar.gz
>                 57   chkexploit-1.13.tar.gz.md5
> Alternate-site: 
> Original-site:  
> Platforms:      Linux/FreeBSD
> Copying-policy: GPL
> End
> 
>         If you would like to automatically receive information about
> new releases of chkexploit, send email to:
> 
> `chkexploit-announce-request@pangeia.com.br', with
> `subscribe chkexploit-announce' in the body of the message.
> 
> The `chkexploit-announce' list is reserved for announcements of new
> chkexploit versions, so it has extremely low volume.
> 
> 
>         Please send comments/ideas/bug reports to:
>         jessen@ahand.unicamp.br
>         nelson@pangeia.com.br
> 
> Thanks,
> Klaus.
> 
> 
> 
> --
> TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe"
> to
> debian-private-request@lists.debian.org . 
> Trouble?  e-mail to templin@bucknell.edu .


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-private-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .