Frederique Rijsdijk
2009-Sep-15 08:01 UTC
FreeBSD bug grants local root access (FreeBSD 6.x)
Hi, Any info on this subject on http://www.theregister.co.uk/2009/09/14/freebsd_security_bug/ -- Frederique
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Frederique Rijsdijk wrote:> Hi, > > Any info on this subject on > > http://www.theregister.co.uk/2009/09/14/freebsd_security_bug/Currently we (secteam@) are testing the correction patch and do peer-review on the security advisory draft, the bug was found and fixed on -HEAD and 7-STABLE before 7.1-RELEASE during some stress test but was not recognized as a security vulnerability at that time. The exploit code has to be executed locally, i.e. either by an untrusted local user, or be exploited in conjunction with some remote vulnerability on applications that allow the attacker to inject their own code. We can not release further details about the problem at this time, though, but I think we will likely to publish the advisory and correction patch this patch Wednesday. Cheers, - -- Xin LI <delphij@delphij.net> http://www.delphij.net/ FreeBSD - The Power to Serve! -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.12 (FreeBSD) iEYEARECAAYFAkqvWZgACgkQi+vbBBjt66DAwACdHwj+VB8Ak0oRwhiH7X16+2Wl nU0An2bMd4Y40DqCUJI+DEmNmozmm7fz =+LtQ -----END PGP SIGNATURE-----
utisoft@googlemail.com
2009-Sep-15 11:32 UTC
FreeBSD bug grants local root access (FreeBSD 6.x)
On 15 Sep 2009 08:43, Frederique Rijsdijk <frederique@isafeelin.org> wrote:> Hi,> Any info on this subject on> http://www.theregister.co.uk/2009/09/14/freebsd_security_bug/It appears to only affect 6.x.... and requires local access. If an attacker has local access to a machine you're screwed anyway. Chris
At 05:08 AM 9/15/2009, Xin LI wrote:>-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >Hi, > >Frederique Rijsdijk wrote: > > Hi, > > > > Any info on this subject on > > > > http://www.theregister.co.uk/2009/09/14/freebsd_security_bug/ > >Currently we (secteam@) are testing the correction patch and do >peer-review on the security advisory draft, the bug was found and fixed >on -HEAD and 7-STABLE before 7.1-RELEASE during some stress test but was >not recognized as a security vulnerability at that time. The exploit >code has to be executed locally, i.e. either by an untrusted local user, >or be exploited in conjunction with some remote vulnerability on >applications that allow the attacker to inject their own code. > >We can not release further details about the problem at this time, >though, but I think we will likely to publish the advisory and >correction patch this patch Wednesday.Hi, Just wondering if there is any update on this issue ? ---Mike -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet since 1994 www.sentex.net Cambridge, Ontario Canada www.sentex.net/mike