Bugtraq mailing list archives
Re: Frotpage Extensions and Unix
From: mjastrem () THUNDER OCIS TEMPLE EDU (M.)
Date: Sat, 15 Mar 1997 14:02:32 -0500
On Mon, 10 Mar 1997, Roland Spatzenegger wrote:
has anyone ever checked the Unix Frontpage Extensions for security holes ? (Haven't found anything in the mailimglist archiv) They are distributed as binaries and run as suid root (and are from M$ .-).
We were investigating installing them here at Temple U. on the request of
a faculty member.  Upon installing FP I it dawned on me that they were entirely
too messy and dangerous to use.  (They also managed to take control of
99% of the CPU for a couple of hours!).  Rather than risk duplication of
effort, see the following pointer for details :
        http://www.mr.net/~fritchie/frontpage.html .
//Michael.
 .   +      . ^
,      \|/    michael jastremski ( mike () temple edu
   *  -[ ]-   http://newsroom.temple.edu ) http://thunder.temple.edu/~mjastrem
 .     /|\    temple universe // philadelphia, USA
   0       .
Current thread:
- Exploit for buffer overflow in /bin/eject - Solaris 2.X - Cristian SCHIPOR (Mar 13)
- Re: Exploit for buffer overflow in /bin/eject - Solaris 2.X - Jonathan Sturges (Mar 13)
- Re: Exploit for buffer overflow in /bin/eject - Solaris 2.X - The Nocturnal Prince (Mar 13)
 - Shockwave Security Alert Aleph One (Mar 13)
- Frotpage Extensions and Unix Roland Spatzenegger (Mar 10)
 - Re: Frotpage Extensions and Unix M. (Mar 15)
 
 - Re: Shockwave Security Alert Joseph Fish (Mar 14)
 - Internet Explorer Bug #4 Aaron Spangler (Mar 14)
 - Internet explorer gives your NT password away! Paul Ashton (Mar 14)
 
 - gzip security problem Aleph One (Mar 13)
 
 - Re: Exploit for buffer overflow in /bin/eject - Solaris 2.X - Jonathan Sturges (Mar 13)
 - Re: Exploit for buffer overflow in /bin/eject - Solaris 2.X - Casper Dik (Mar 14)
 
- <Possible follow-ups>
 - Re: Exploit for buffer overflow in /bin/eject - Solaris 2.X - Casper Dik (Mar 14)
 
