From owner-freebsd-security@FreeBSD.ORG Fri Dec 17 15:03:25 2004 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id E41A416A4CE for ; Fri, 17 Dec 2004 15:03:25 +0000 (GMT) Received: from cowbert.2y.net (d46h180.public.uconn.edu [137.99.46.180]) by mx1.FreeBSD.org (Postfix) with SMTP id 5BC3043D1F for ; Fri, 17 Dec 2004 15:03:25 +0000 (GMT) (envelope-from sirmoo@cowbert.net) Received: (qmail 22848 invoked by uid 1001); 17 Dec 2004 15:03:24 -0000 Date: Fri, 17 Dec 2004 10:03:24 -0500 From: "Peter C. Lai" To: Bill Vermillion Message-ID: <20041217150324.GE1331@cowbert.net> References: <20041217120138.7A89116A4D2@hub.freebsd.org> <20041217145315.GB68582@wjv.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20041217145315.GB68582@wjv.com> User-Agent: Mutt/1.5.6i cc: freebsd-security@freebsd.org Subject: Re: Strange command histories in hacked shell history X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Dec 2004 15:03:26 -0000 I thought on BSD, there was no distinction between euid and uid. If you login as user 'foo', and su to 'bar', your uid is bar and you gain all of "bar"'s privs. On Fri, Dec 17, 2004 at 09:53:15AM -0500, Bill Vermillion wrote: > > Message: 1 > > Date: Thu, 16 Dec 2004 20:31:05 +0800 > > From: Ganbold > > Subject: Strange command histories in hacked shell server > > Just a minor comment on one portion of your message. > > [All deleted except the pertinent part - wjv] > > > Machine is configured in such way that everyone can create an account itself. > > Some user dir permissions: > > ... > > drwxr-xr-x 2 root wheel 512 Mar 29 2004 new > > drwx------ 3 tamiraad unix 512 Apr 9 2004 tamiraad > > drwxr-xr-x 6 tsgan tsgan 1024 Dec 16 17:51 tsgan > > drwx------ 4 tugstugi unix 512 Dec 13 20:34 tugstugi > > drwxr-xr-x 5 unix unix 512 Dec 13 12:37 unix > > ... > > User should log on as new with password new to create an account. > > > Accounting is enabled and kern.securelevel is set to 2. Only one > > account 'tsgan' is in wheel group and only tsgan gan become root > > using su. > > I've asked others before and never got a real answer on the design > of 'su' which to my way of thinking has a security hold that shold > be fixed. > > su checks the EUID of the user to see if they are in 'wheel' to > enable them to su to root. It would seem to me it should > use the UID. > > In your case if the 'tsgan' account does not have a secure > password, and some breaches the 'tsgan' account in any manner, such > as a SUID tsgan as I see it, then that user who cracked the 'tsgan' > account can su to root. > > So in your case there is the possibility that someone else > su'ed to 'tsgan' and then su'ed to root. > > Can anyone explain why su does not use the UID from the login > instead of the EUID ? It strikes me as a security hole, but I'm no > security expert so explanations either way would be welcomed. > > Bill > > > -- > Bill Vermillion - bv @ wjv . com > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" -- Peter C. Lai University of Connecticut Dept. of Molecular and Cell Biology Yale University School of Medicine SenseLab | Research Assistant http://cowbert.2y.net/