Bugtraq mailing list archives
Re: hylafax-4.0.2 local exploit
From: thomas () SUSE DE (Thomas Biege)
Date: Fri, 5 Nov 1999 08:36:22 +0100
Hi,
I spend alot o' time for security checks on hylafax-v4.0pl2 for SuSE
Linux.
I'll tell you, that there are some more scary holes in it.
After our maintainer of hylafax makes my patch work with the
_new_ version of hylafax and the author of hylafax gets my report + patch
I'll make it public.
BTW, it would be nice, if you'll behave the same way. 1.) notice the
author/vendors and 2.) make it public.
Brock, check out a CGI script called faxsurvey. More then a year ago I
posted a remote cmd. exec. exploit to bugtraq. I think it isn't fixed till
now. The script wouldn't be installed on SuSE Linux.
last notice: faxalter isn't installed SUID on SuSE Linux, and doesn't have
to, because the server has uid uucp and calls faxalter, AFAIR.
Bye,
Thomas
--
Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
E@mail: thomas () suse de Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka"
Key fingerprint = 09 48 F2 FD 81 F7 E7 98 6D C7 36 F1 96 6A 12 47
Current thread:
- Re: hylafax-4.0.2 local exploit Thomas Biege (Nov 04)
