Date: Tue, 12 Aug 1997 21:17:15 -0600 From: John-David Childs <jdc@denver.net> To: freebsd-questions@freebsd.org Subject: Re: Please explain why this is a security hole in /etc/daily Message-ID: <19970812211715.37172@denver.net> In-Reply-To: <199708112038.WAA19822@curry.mchp.siemens.de>; from Andre Albsmeier on Mon, Aug 11, 1997 at 10:38:09PM %2B0200 References: <199708112038.WAA19822@curry.mchp.siemens.de>
next in thread | previous in thread | raw e-mail | index | archive | help
On Monday August 1997, Andre Albsmeier <Andre.Albsmeier@mchp.siemens.de>
had this to say about "Please explain why this is a security hole in
/etc/daily":
> Hi,
>
> using 2.2-STABLE we find the following in /etc/daily:
>
> # This is a security hole, never use 'find' on a public directory
> # with -exec rm -f as root. This can be exploited to delete any file
> # on the system.
[SNIP code]
> Please tell me, why this is so, and how I could clean /tmp securely
> since this is no longer done at startup. I have experimented a bit
> with find and symlinks but didn't find anything unsecure :-)
It has to do with a potential "race" condition...the following is
from "rough" memory and should be corrected by others if I'm wrong
The find program works in two stages...
1) traverse a specified directory looking for filenames which match the
given pattern
2) perform the specified action
Now, if you're system is very busy (deliberately or otherwise) a hacker
might replace a "good" file with a symlink to a system file (e.g.
/etc/master.passwd) during the time between step 1 and step 2...guess what
happens next if the "action" is "rm -f {} \;" :=)
--
John-David Childs (JC612) Enterprise Internet Solutions
System Administrator @denver.net/Internet-Coach/@ronan.net
& Network Engineer 901 E 17th Ave, Denver 80218
As of this^H^H^H^H next week, passwords will be entered in Morse code.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19970812211715.37172>
