Contributed by Dengue on from the never-trust-the-users dept.
http://security-protocols.com/article.php?sid=1239Patch 003 fixes this condition in OpenBSD 3.1, and Patch 021 fixes this condition in OpenBSD 3.0. See errata.html for more details." On current OpenBSD systems, any local user (being or not in the wheel group) can fill the kernel file descriptors table, leading to a denial of service. Because of a flaw in the way the kernel checks closed file descriptors 0-2 when running a setuid program, it is possible to combine these bugs and earn root access by winning a race condition.
The following is research material from FozZy from Hackademy and Hackerz Voice newspaper ( http://www.hackerzvoice.org ) and can be distributed modified or not if proper credits are given to them. For educational purposes only, no warranty of any kind, I may be wrong, this post could kill you mail reader, etc. "
(Comments are closed)
By Anonymous Coward () on
Comments
By Cindy_Montreal () on
What would be nice, if in ports there was packages that contains nothing but bugs, flaws, security risks, and other problems. This way anyone who feels they need to install security problem could. :)
-- Cindy_Montreal
Comments
By Anonymous Coward () on
Comments
By Anonymous Coward () on
i think it is better if he audits openbsd
rather than freebsd...
By Cindy_Montreal () on
Comments
By Roo () on
Grand Prix should be coming up soon, that place goes mad during GP week !
Favourite places to eat out were Kaizen, Primadonna and for somewhere less pricey I used to love the Mess Hall in Westmount. That was near where I was staying - handy.
It's possible that I might be heading back out there for a couple of weeks in June. Here's hoping, love that City !
Cheers,
Roo
By Anonymous Coward () on
Comments
By Anonymous Coward () on
over to openbsd.org to get the patch.
But this bug was found and fixed on May 8 so I did
not need to do anything.
NEWS??