lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100304161141.23670.qmail@securityfocus.com>
Date: 4 Mar 2010 16:11:41 -0000
From: noone@...hing.com
To: bugtraq@...urityfocus.com
Subject: Re: Re: Todd Miller Sudo local root exploit discovered by Slouching

I believe what andy was alluding to was, why post on bugtraq with a subject Sudo local exploit discovered. Its not a sudo local root exploit, its an exploit in a misconfigured sudo file. You can post it as a new exploit technique for a misconfiguration, and i'm sure all the vuln and pen guys would be happy.

In my opinion, its a good technique to check for and i will use it in my arsenal of things to look for in terms of admin misconfigs but since its not in the default config on sudo, you'd have to e an idiot to not fully path out a commnd you are giving root access for... 

Anyway think about how you phrase things next time. 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ