On Mon, Oct 25, 1999 at 07:05:01PM -0400, Wietse Venema wrote:
> I was talking about seteuid(), which leaves real uid == 0, so that
> the process remains protected against groping by unprivileged users.
all I was trying to say is:
1) ssh _did_ use seteuid() for swapping uids (until version 1.2.12. ossh
and openssh still use seteuid() and are not vulnerable to this attack).
2) post-ssh-1.2.12 uses a different, more complex approach and failes.
- Re: Fix for ssh-1.2.27 symlink/bind problem Eivind Eklund
- Re: Fix for ssh-1.2.27 symlink/bind problem Scott Gifford
- Re: Fix for ssh-1.2.27 symlink/bind problem Wietse Venema
- Re: Fix for ssh-1.2.27 symlink/bind problem Markus Friedl
- Re: Fix for ssh-1.2.27 symlink/bind proble... Wietse Venema
- Re: Fix for ssh-1.2.27 symlink/bind p... Markus Friedl
- Re: Fix for ssh-1.2.27 symlink/bi... Wietse Venema
- Re: Fix for ssh-1.2.27 symlink/bi... Casper Dik
- Re: Fix for ssh-1.2.27 symlink/bi... Eivind Eklund
- Re: Fix for ssh-1.2.27 symlink/bi... Wietse Venema
- Re: Fix for ssh-1.2.27 symlink/bind p... Markus Friedl
- Re: Fix for ssh-1.2.27 symlink/bi... Wietse Venema
- Re: Fix for ssh-1.2.27 symlink/bind problem Casper Dik
- Re: Fix for ssh-1.2.27 symlink/bind problem Phillip Vandry
- Re: Fix for ssh-1.2.27 symlink/bind problem Toomas Kiisk
- Re: Fix for ssh-1.2.27 symlink/bind problem Olaf Seibert
- Re: Fix for ssh-1.2.27 symlink/bind problem Scott Gifford
- Re: Fix for ssh-1.2.27 symlink/bind problem Dan Astoorian
