Full Disclosure mailing list archives

Re: !SPAM! Automated ssh scanning


From: Jan Luehr <jluehr () gmx net>
Date: Thu, 26 Aug 2004 21:49:10 +0200

Greetings,

Am Donnerstag, 26. August 2004 16:43 schrieb Ron DuFresne:
On Thu, 26 Aug 2004, Richard Verwayen wrote:
On Thu, 2004-08-26 at 15:12, Todd Towles wrote:
 The kernel could be save. But with weak passwords, you are toast. Any
automated tool would test guest/guest.

Hello Todd!

You are right about the passwords, but guest is only a unprivileged
account as you may have on many prodruction machines. But they managed
to become root on this machine due to a kernel(?) exploit!
Should I then consider any woody system to be insecure to let people
work at?

If your uasers are not trustable, then they should not have access to
local systems of yours.  Once a person has a shell, then they are 95% to
root.

So your point is, there a much already known local root exploits on an 
standard woody system no one cares about?

fup2 debian-security () lists debian org

Keep smiling
yanosz

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: