Date: Sat, 10 Feb 1996 11:36:15 -0500 (EST) From: Brian Tao <taob@io.org> To: Paul Traina <pst@shockwave.com> Cc: FREEBSD-SECURITY-L <freebsd-security@freebsd.org> Subject: Re: User creating root-owned directories? Message-ID: <Pine.BSF.3.91.960210095956.17721M-100000@zip.io.org> In-Reply-To: <199602100808.AAA02008@precipice.shockwave.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 10 Feb 1996, Paul Traina wrote: > > errr... did your sysadmin have root when he did ls -l in that user's > directory? > > if so, did he have . in his path? The sysadmin would be me ;-), and the root account does not include . anywhere in the path. The three others with root access were not involved with this. > You possibly could have been had by someone who had a ls executable > which, when run as root, deleted itself, created the directory, AND > created a setuid program somewhere. I'll perform a more detailed scan for setuid and setgid programs today then. A lot of our users run setuid CGI scripts (PHP tools, a Web page logging package)... the hacker may have named a setuid program after one of the PHP scripts to hide it from scrutiny. Probably a good time to compare MD5 signatures on the system binaries too... *sigh*. > In any case, I'd upgrade to sendmail 8.7.x (x=current) and freebsd 2.1 > -stable just to be sure you've got all the security patches. 8.6.12 does > have bugs in it which could allow a user to gain root. Being sendmail and all, 8.7.x probably does too. ;-) It'll take a little bit of work to do that, since our current mail server is on BSD/OS 2.0, and also handles several other functions. Thanks, Paul. -- Brian Tao (BT300, taob@io.org) Systems Administrator, Internex Online Inc. "Though this be madness, yet there is method in't"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960210095956.17721M-100000>