Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 21 Sep 1998 02:45:37 -0700
From:      "David O'Brien" <obrien@NUXI.com>
To:        Jake Hamby <jehamby@lightside.com>, hackers@FreeBSD.ORG
Subject:   Re: disallow setuid root shells?
Message-ID:  <19980921024537.A1493@nuxi.com>
In-Reply-To: <199702240549.VAA01306@lightside.com>; from Jake Hamby on Sun, Feb 23, 1997 at 09:49:08PM -0800
References:  <199702240549.VAA01306@lightside.com>

next in thread | previous in thread | raw e-mail | index | archive | help
> access.  Under Solaris, I've discovered that none of the standard shells 
> will allow a user to gain root privileges through a setuid root shell!
> The sh and ksh shells will run, but the user will have their normal 

You didn't try very hard:

    sol26:> ll
    total 856
    -r-sr-xr-x   1 root     bin       158372 Jul 15  1997 csh*
    -r-sr-xr-x   1 root     bin       186356 Jul 15  1997 ksh*
    -r-sr-xr-x   1 root     root       88620 Jul 15  1997 sh*

    sol26:> ./ksh
    # id
    uid=1765(obrien) gid=10(staff) euid=0(root)
    # exit
    sol26:> ./sh
    $ id
    uid=1765(obrien) gid=10(staff)
    $ exit
    sol26:> muztag:/tmp/.z> ./sh -p
    # id
    uid=1765(obrien) gid=10(staff) euid=0(root)
    # exit

/bin/ksh is pretty standard on sysV-based systems.
For sh RTFM.

     -p        If the -p flag is present, the shell will not  set
               the  effective user and group IDs to the real user
               and group IDs.


-- 
-- David    (obrien@NUXI.ucdavis.edu  -or-  obrien@FreeBSD.org)

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980921024537.A1493>