lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050308031847.30739.qmail@www.securityfocus.com>
Date: 8 Mar 2005 03:18:47 -0000
From: Matthieu <gene6@...e6.com>
To: bugtraq@...urityfocus.com
Subject: Re: Gene6 FTP Server Local Privilege Escalation Vulnerability


In-Reply-To: <5ed07f7a05030708092d774ef8@...l.gmail.com>

>(4) Vendor Reply
>
>Reply from the support@...tpServer.com
[..]

Here is a copy of our first reply with the solution :

- create a new administrator account
- in Administration / Properties, uncheck Options / Allow all access to localhost.

Do not forget to adjust the "local machine" properties to use the new administration account.

-

The installer will be updated to ask for an administrator account in the next version.

Until then, if needed, the administrators can apply the solution above if running in a multi-users environment.

Matthieu


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ