SECURITY BUG IN INTERACTIVE UNIX SYSV386

Joern Lubkoll lumpi at dobag.in-berlin.de
Wed Feb 13 09:51:45 AEST 1991


jtc at motcad.portal.com (J.T. Conklin) writes:
>In article <1991Feb11.184130.11321 at jwt.UUCP> john at jwt.UUCP (John Temples) writes:
>>In article <KR3NBQQ at dobag.in-berlin.de> lumpi at dobag.in-berlin.de (Joern Lubkoll) writes:
>>>it seems that your very cute interactive unix System has a nice bug !
>>
>>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>>
>>Now, the question is, what do we do to protect ourselves in the meantime?
>If I remember correctly, Sun Microsystems sent out a fixed version of 
>sendmail to its customer base free of charge the week after the Internet
>Worm Attack.  I see no reason why we should expect less from the i386
>UNIX vendors.  In my opinion, any vendor that doesn't respond to this
>problem with the attention it is due, doesn't deserve to be in business.
so mote it be ... says me :-)

jl

-- 
lumpi at dobag.in-berlin.de  --  "Nothing is the complete absence of everything."



More information about the Comp.unix.sysv386 mailing list