Current versions of seyon may contain malicious code

    Date13 Dec 1999
    CategoryDebian
    2857
    Posted ByLinuxSecurity Advisories
    One year ago, we have received a report from SGI that a vulnerability has been discovered in the seyon program which can lead to a root compromise. Any user who can execute the seyon program can exploit this vulnerability.
    One year ago, we have received a report from SGI that a vulnerability
    has been discovered in the seyon program which can lead to a root
    compromise.  Any user who can execute the seyon program can exploit
    this vulnerability.
    
    However, the license of Seyon doesn't permit us to provide a fix, now
    is the Seyon author responsive, nor do we have a patch, nor do we know
    an exploit and can't develop a fixe therefore.
    
    We recommend you switch to minicom instead.
    
    The maintainer of Seyon told us the following:
    
         I notice from reading the SGI announcement that their problem is
         a root exploit because of a setuid Seyon.  The Seyon we ship is
         not setuid, so I doubt we'll have a serious problem.
    
    
    --
    Debian GNU/Linux    .    Security Managers    .    This email address is being protected from spambots. You need JavaScript enabled to view it.
                  This email address is being protected from spambots. You need JavaScript enabled to view it.
      Christian Hudon     .      Wichert Akkerman     .     Martin Schulze
       .      .   
    
    

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"14","type":"x","order":"1","pct":53.85,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":15.38,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"8","type":"x","order":"3","pct":30.77,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.