Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Apr 1998 07:29:17 +1000 (EST)
From:      Peter Jeremy <Peter.Jeremy@alcatel.com.au>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: suid/sgid programs
Message-ID:  <199804192129.HAA12767@gsms01.alcatel.com.au>

next in thread | raw e-mail | index | archive | help
On Sun, 19 Apr 1998 20:45:30 +0000, Niall Smart <rotel@indigo.ie> wrote:
>> But if someone can break the uid that lpr runs as then they can probably
>> break root anyway.
>How?

Well, as a starter, lp{q,r,rm} are setuid root, therefore by
definition once you've broken `the uid that lpr runs as', you've
broken root :-)

Assuming they were setuid something else, the simplest way is with a
couple of trojan lp binaries: as soon as root root prints something,
you've got root access.  It may also be possible to get in via lpd
(which is started as root, but needs to run as `lp'.

Peter

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199804192129.HAA12767>