Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Mario Scarpa
Andres Salomon wrote: > > Ooops. Mandrake cooker, and Debian unstable. In other words: glibc2.2 > systems. glibc 2.1's resolver (/lib/libnss_db.so.2) appears unaffected. > This is why some of you aren't seeing it. > > ii libc6 2.2-6 GNU C Library: Shared libraries and Timezo

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Bob Bernstein
On Tue, 9 Jan 2001 00:11:01 +0100, Wichert Akkerman opined: > > isn't it a good idea to make an announcement to the > > effect that at the very least fping should have its setuid root > > removed? > > You might as well remove all suid bits from all apps from your system, > a reasonably lar

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Wichert Akkerman
Previously Bob Bernstein wrote: > Since this vulnerability is now "in the wild," so to speak, due to this > very discussion, isn't it a good idea to make an announcement to the > effect that at the very least fping should have its setuid root > removed? You might as well remove all suid bits from

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Mario Scarpa
Andres Salomon wrote: > > Ooops. Mandrake cooker, and Debian unstable. In other words: glibc2.2 > systems. glibc 2.1's resolver (/lib/libnss_db.so.2) appears unaffected. > This is why some of you aren't seeing it. > > ii libc6 2.2-6 GNU C Library: Shared libraries and Timez

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Samu
On Mon, Jan 08, 2001 at 03:07:26PM -0500, Bob Bernstein wrote: > > On Mon, 8 Jan 2001 19:14:53 +0100, Wichert Akkerman opined: > > > We're aware of it and looking into this at the moment, as well as > > checking if there are other similar problems we might have missed. > > Since this vulnerabi

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Bob Bernstein
On Tue, 9 Jan 2001 00:11:01 +0100, Wichert Akkerman opined: > > isn't it a good idea to make an announcement to the > > effect that at the very least fping should have its setuid root > > removed? > > You might as well remove all suid bits from all apps from your system, > a reasonably la

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Juan Fuentes
* Andres Salomon ([EMAIL PROTECTED]) wrote: > try it w/ traceroute. lotsa fun, and it works > on mandrake, too. With sudo is just a hoot, just do sudo no need for password. Juan Fuentes

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Andres Salomon
Ooops. Mandrake cooker, and Debian unstable. In other words: glibc2.2 systems. glibc 2.1's resolver (/lib/libnss_db.so.2) appears unaffected. This is why some of you aren't seeing it. ii libc6 2.2-6 GNU C Library: Shared libraries and Timezone

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Wichert Akkerman
Previously Bob Bernstein wrote: > Since this vulnerability is now "in the wild," so to speak, due to this > very discussion, isn't it a good idea to make an announcement to the > effect that at the very least fping should have its setuid root > removed? You might as well remove all suid bits from

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Björn Metzdorf
- Original Message - From: Andres Salomon <[EMAIL PROTECTED]> To: Kevin <[EMAIL PROTECTED]> Cc: Sent: Monday, January 08, 2001 9:37 PM Subject: Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability > try it w/ traceroute. lotsa fun, and it works > on mandrake, too. > > t

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Andres Salomon
try it w/ traceroute. lotsa fun, and it works on mandrake, too. things like this make me glad i don't have to deal w/ untrusted customers that have shell access... ii traceroute 1.4a8-1Traces the route taken by packets over a TCP On Mon, Jan 08, 2001 at 11:13:49AM -0700, Kevin wr

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Bob Bernstein
On Mon, 8 Jan 2001 19:14:53 +0100, Wichert Akkerman opined: > We're aware of it and looking into this at the moment, as well as > checking if there are other similar problems we might have missed. Since this vulnerability is now "in the wild," so to speak, due to this very discussion, isn't it

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Samu
On Mon, Jan 08, 2001 at 03:07:26PM -0500, Bob Bernstein wrote: > > On Mon, 8 Jan 2001 19:14:53 +0100, Wichert Akkerman opined: > > > We're aware of it and looking into this at the moment, as well as > > checking if there are other similar problems we might have missed. > > Since this vulnerab

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Juan Fuentes
* Andres Salomon ([EMAIL PROTECTED]) wrote: > try it w/ traceroute. lotsa fun, and it works > on mandrake, too. With sudo is just a hoot, just do sudo no need for password. Juan Fuentes -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Andres Salomon
Ooops. Mandrake cooker, and Debian unstable. In other words: glibc2.2 systems. glibc 2.1's resolver (/lib/libnss_db.so.2) appears unaffected. This is why some of you aren't seeing it. ii libc6 2.2-6 GNU C Library: Shared libraries and Timezone -- To UNSUBSCRIBE, email to

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Björn Metzdorf
- Original Message - From: Andres Salomon <[EMAIL PROTECTED]> To: Kevin <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Monday, January 08, 2001 9:37 PM Subject: Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability > try it w/ traceroute. lotsa fun, and it works > on

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Andres Salomon
try it w/ traceroute. lotsa fun, and it works on mandrake, too. things like this make me glad i don't have to deal w/ untrusted customers that have shell access... ii traceroute 1.4a8-1Traces the route taken by packets over a TCP On Mon, Jan 08, 2001 at 11:13:49AM -0700, Kevin w

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Christian Hammers
On Mon, Jan 08, 2001 at 11:13:49AM -0700, Kevin wrote: > When I tried it, I did not get the same results. Me too, although there are even more different: ping worked fine as without settting the variable but fping was vulnerable. bye, -christian- -- Christian HammersWESTEND GmbH - Aachen u

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Wichert Akkerman
Previously thomas lakofski wrote: > Since I've not had any response yet, I thought I'd give a demonstration of how > nasty this is: We're aware of it and looking into this at the moment, as well as checking if there are other similar problems we might have missed. Wichert. -- ___

Re[2]: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Kevin
When I tried it, I did not get the same results. -rwsr-xr-x1 root root19728 Oct 30 1999 /usr/bin/fping* ldd `which fping` libc.so.6 => /lib/libc.so.6 (0x00127000) /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x0011) ping localhost PING localhost (127.0.0.1): 5

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Bob Bernstein
On Mon, 8 Jan 2001 19:14:53 +0100, Wichert Akkerman opined: > We're aware of it and looking into this at the moment, as well as > checking if there are other similar problems we might have missed. Since this vulnerability is now "in the wild," so to speak, due to this very discussion, isn't i

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread thomas lakofski
Since I've not had any response yet, I thought I'd give a demonstration of how nasty this is: Script started on Mon Jan 8 17:48:23 2001 [EMAIL PROTECTED]:~$ export RESOLV_HOST_CONF=/etc/shadow [EMAIL PROTECTED]:~$ ping localhost PING localhost (127.0.0.1): 56 data bytes --- localhost p

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Wichert Akkerman
Previously thomas lakofski wrote: > Since I've not had any response yet, I thought I'd give a demonstration of how > nasty this is: We're aware of it and looking into this at the moment, as well as checking if there are other similar problems we might have missed. Wichert. -- __

Re[2]: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Kevin
When I tried it, I did not get the same results. -rwsr-xr-x1 root root19728 Oct 30 1999 /usr/bin/fping* ldd `which fping` libc.so.6 => /lib/libc.so.6 (0x00127000) /lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x0011) ping localhost PING localhost (127.0.0.1):

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread Christian Hammers
On Mon, Jan 08, 2001 at 11:13:49AM -0700, Kevin wrote: > When I tried it, I did not get the same results. Me too, although there are even more different: ping worked fine as without settting the variable but fping was vulnerable. bye, -christian- -- Christian HammersWESTEND GmbH - Aachen

IP spoofing protection

2001-01-08 Thread Carel Fellinger
Hai and a jolly new year, I'm in the process of switching from pmfirewall to ipmasq. I've read a lot, and now I'm confused:) I thought rp_filter was supposed to prevent ip spoofing, but ipmasq still adds rules like: ipchains -A input -j DENY -i ! lo -s 127.0.0.1/255.0.0.0 -l ipchains -A in

Re: 'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread thomas lakofski
Since I've not had any response yet, I thought I'd give a demonstration of how nasty this is: Script started on Mon Jan 8 17:48:23 2001 thomas@io:~$ export RESOLV_HOST_CONF=/etc/shadow thomas@io:~$ ping localhost PING localhost (127.0.0.1): 56 data bytes --- localhost ping statistics

IP spoofing protection

2001-01-08 Thread Carel Fellinger
Hai and a jolly new year, I'm in the process of switching from pmfirewall to ipmasq. I've read a lot, and now I'm confused:) I thought rp_filter was supposed to prevent ip spoofing, but ipmasq still adds rules like: ipchains -A input -j DENY -i ! lo -s 127.0.0.1/255.0.0.0 -l ipchains -A i

'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread thomas lakofski
Hi, A friend of mine just tried this against my unstable box and successfully obtained the contents of /etc/shadow. I imagine that this is a problem in libc -- I'll leave it to [EMAIL PROTECTED] to file bug reports. cheers, Thomas -- who's watching your watchmen? gpg: pub 1024D/81FD

'export RESOLV_HOST_CONF= any file you want' local vulnerability

2001-01-08 Thread thomas lakofski
Hi, A friend of mine just tried this against my unstable box and successfully obtained the contents of /etc/shadow. I imagine that this is a problem in libc -- I'll leave it to [EMAIL PROTECTED] to file bug reports. cheers, Thomas -- who's watching your watchmen? gpg: pub 1024D/81F

Re: Encrypted file transfer

2001-01-08 Thread Pedro Zorzenon Neto
I found a good solution for my problem... I copied the compiled ELF file of gnupg (/usr/bin/gpg) to $HOME/bin Then I copied the libraries it needs to $HOME/lib Created ~/.gnupg/ and copied pubring.gpg into it So, to execute gnupg I need to set up the variable to look for libraries in a n

Re: Encrypted file transfer

2001-01-08 Thread Pedro Zorzenon Neto
I found a good solution for my problem... I copied the compiled ELF file of gnupg (/usr/bin/gpg) to $HOME/bin Then I copied the libraries it needs to $HOME/lib Created ~/.gnupg/ and copied pubring.gpg into it So, to execute gnupg I need to set up the variable to look for libraries in a n