[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <200405131247.25198.meredydd@everybuddy.com>
Date: Thu, 13 May 2004 12:47:25 +0100
From: Meredydd <meredydd@...rybuddy.com>
To: bugtraq@...urityfocus.com
Cc: Anonymous <nobody@...anoici.org>, full-disclosure@...ts.netsys.com
Subject: Re: surfboard1.1.6 local exploit.
I'm...mildly impressed. Someone's still *using* that thing? Not that
things have changed in this regard, but the latest version is 1.1.9,
anyway.
Serious question, actually - they shouldn't exist, I know (believe me, I
don't still code like that...), but exactly how severe is a hole such
as this, which is only exploitable by the user who is running the
daemon in the first place? Unless you're doing something like running
the daemon as root, with a user-modifiable config file (at which point
you have much more serious problems, like CGI), this doesn't actually
escalate someone's privilege at all.
On Tuesday 11 May 2004 21:19, Anonymous wrote:
> Solution:
>
> fluffy has written a great cmd line hack to solve the problem:
>
> for i in `locate surfboard`; do rm -rf $i ; done
>
> Should do the trick ;)
Unfortunately, fluffy has neglected the file actually
responsible, /usr/local/bin/surfd. Sorry to break it to him/her/it :^)
fluffy also forgot the next line, which goes something along the lines
of:
apt-get install apache
Seriously. You shouldn't be using this lump of junk. Anyway, you
*definitely* shouldn't be using 1.1.6, cause there's a good couple of
arbitrary-traversal holes in there, along with tons of bugs (something
you'd know if you read the archives of this list). 1.1.9 was the latest
at time of announcement, and v1.1.10 is now on the sourceforge site,
for any fool who's still using it...
Meredydd
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists