----- Forwarded message from Narrow <[EMAIL PROTECTED]> ----- > From: Narrow <[EMAIL PROTECTED]> > Reply-To: Narrow <[EMAIL PROTECTED]> > X-Mailer: Privacyx.com Anonymous Certificate Authority > Date: Thu, 10 Aug 2000 19:53:27 +0300 > To: [EMAIL PROTECTED] > Subject: FlagShip v4.48.7449 premission vulnerability > > _________________________________________________________________________________ > > Content-Type: premission/vulnerability > Date : 09/08/2000 16:05 > Sender : Narrow <[EMAIL PROTECTED]> > Subject : FlagShip v4.48.7449 premission vulnerability > X-System : Red Hat 6.0 > X-Status : Narrow-ADV-#08 > _________________________________________________________________________________ > > DESCRIPTION > FlagShip is a cross-platform database development system, fully > compatible to Clipper, handles also other xBase dialects. FlagShip > is shipped with Red Hat linux 6.0 Application CD. > > PROBLEM > Several binary files are world writeable. Anyone could replace > them with a trojan and trick someone to execute the trojaned binary > files. > > The binary files: > /usr/bin/FSserial > /usr/bin/FlagShip_c > /usr/bin/FlagShip_p > > SOLUTION > Change the premission of the binary files to 755. > > -- > Narrow - [EMAIL PROTECTED] - http://www.zone.ee/unix/ > > bash# ./win.com > Segmental fault > > ----- End forwarded message ----- -------------------------------------------------------------------------- Utk berhenti langganan, kirim email ke [EMAIL PROTECTED] Informasi arsip di http://www.linux.or.id/milis.php3 Pengelola dapat dihubungi lewat [EMAIL PROTECTED]
