Subject: Re: rdist security hole, NetBSD 0.9
To: Thomas Lopatic <lopatic@informatik.tu-muenchen.de>
From: Rick Weldon <rick@badboy-jr.hq.af.mil>
List: netbsd-bugs
Date: 02/03/1994 21:38:04
> 
> Hello,
> 
> you are probably aware of this problem since you mentioned an upgrade to
> a newer rdist release in the NetBSD 0.9 todo file. But then again, perhaps
> you aren't. :) To exploit the hole:
> 
> - invoke rdist with the line 'rdist -Server'
> - then type 'S' followed by any command, e. g. 'Sid', which will show
>   that any command run by rdist is executed with a real uid of 0.
> 
> Since rdist simply swaps euid and uid, the call to setuid in server.c does
> not succeed (uid = 0, euid = uid of the user invoking rdist from the shell).
> 
> -Thomas
> 

Fixed some time ago.

Rick

------------------------------------------------------------------------------