Re: Remote Root Hole in FreeBSD Ports

From: networkingysistemas networkingysistemas xxx (rdelcampoat_private)
Date: Sat Dec 29 2001 - 01:41:02 PST

  • Next message: Richard M. Smith: "RE: Too much misleading advice on the Universal Plug-and-Play security hole"

    ----- Mensaje original -----
    > This notice is in reference to a reported root hole in the FreeBSD port of
    > perdition and more specifically the library vanessa_logger that it 
    > requires.
    > 
    > http://www.securityfocus.org/archive/1/247148
    > 
    > First I would like to express great dismay that this was published on a 
    > public list (BugTraq) without prior consultation with the author (myself) 
    > or to my knowledge the maintainer of the FreeBSD port, Konstantinos 
    > Konstantinidis.
    > 
    > There is a string format bug in vanessa_logger 0.0.1 which is what the post
    > to BugTraq makes reference to. FreeBSD, was at the time of the posting 
    > shipping this vulnerable version.
    > 
    > vanessa_logger 0.0.2, released on the 29th of June 2001, is not vulnerable
    > to this exploit. FreeBSD have released a patched version of vanessa_logger
    > 0.0.1 which is also not vulnerable. Users should upgrade to either of 
    > these.
    > 
    >     vanessa_logger 0.0.2 is available from
    >     ftp://ftp.vergenet.net/pub/vanessa/vanessa_logger/0.0.2
    > 
    > At this time I would also like to highlight the importance of running
    > perdition as a non-root user. The --username and --group options enable
    > perdition to run as non-root for most of a processes life. If these options
    > are used then the potential risk from any exploits stemming from the string
    > format bug in vanessa_logger are significantly reduced.
    > 
    > For more information on perdition please see 
    > http://vergenet.net/linux/perdition/
    > 
    > -- 
    > Horms
    > Author of perdition and vanessa_logger
    



    This archive was generated by hypermail 2b30 : Sat Dec 29 2001 - 11:00:54 PST