Date: Tue, 1 Oct 1996 11:05:03 PDT From: Bill Fenner <fenner@parc.xerox.com> To: Marc Slemko <marcs@znep.com> Cc: freebsd-security@freebsd.org Subject: Re: setuid programs in freebsd Message-ID: <96Oct1.110511pdt.177476@crevenia.parc.xerox.com> In-Reply-To: Your message of "Sun, 29 Sep 1996 20:55:48 PDT." <Pine.BSF.3.95.960929214259.16956L-100000@alive.ampr.ab.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
Marc, There are certain programs that have been modified to do the minimum required tasks before releasing their setuid-ness, e.g. ping and traceroute basically do main() { s = socket(); setuid(getuid()); I've been meaning to do the same to mrinfo & mtrace for quite a long time. Perhaps these could be specially labelled in your document? > 119 32 -r-sr-xr-x 1 root bin 16384 Jul 16 20:34 ./usr/sbin > /traceroute > >COMMENTS: There have been some recent security fixes in traceroute, but >I am uncertain as to if they fix exploitable holes. *** Yes, the holes are exploitable if you control the DNS of a host that you can traceroute through. >COMMENTS: ping is a very useful thing for users, although there are possible >denial of service attacks possible, especially with the '-l' option. There >have been some potential security holes fixed after 2.1.5 was released, >but it appears like none of them are exploitable. Perhaps. I agree, the setuid(getuid()) in ping was basically belt-and-suspenders kind of fix. Bill
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?96Oct1.110511pdt.177476>