--5xSkJheCpeK0RUEJ Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Description ----------- We have received a report from SGI that a vulnerability has been discovered in the seyon program. This can lead to a root compromise. Any user who can execute the seyon program can exploit this vulnerability. Since SGI does not provide exploit information, we are unable to fix the problem. SGI provided such information only to recognized security response/incident/coordination organizations and bugtraq doesn't seem to be accepted. SGI doesn't develop patches to third party products, thus there is no chance for a quick fix. Vulnerability ------------- Since a root compromise needs an executable that runs as root we tend to belive that this needs a setuid seyon. The Seyon package as provided with Debian GNU/Linux does *not* run setuid root. Thus we doubt that the seyon package as provided with Debian GNU/Linux can be used to exploit root if you don't change the default behaviour. --=20 Never trust an operating system you don't have source for! --5xSkJheCpeK0RUEJ Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia iQCVAwUBNedPzhRNm5Suj3z1AQHEpwP+MYhSUKw6w+801H5WNJpptShGXCTmpUkE Ud7TdBIgdaiNQY7KSPvDxBjIE2y2cxJ66fmqr4283DkA/38WqULXEKyjCL0hv0eM 4rEA4LJtTGHUDwm1BRxiLhMra7s2BA/anguwGOKpHKtDdtkBmXUY5qrEXVwt9KU7 6GV5D3ASz+U= =Srhw -----END PGP SIGNATURE----- --5xSkJheCpeK0RUEJ--
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:14:02 PDT