Date: Thu, 4 Jul 2002 22:50:09 +1000 From: Tim Robbins <tjr@FreeBSD.ORG> To: Peter Pentchev <roam@ringlet.net> Cc: Akinori MUSHA <knu@iDaemons.org>, audit@FreeBSD.ORG Subject: Re: suidperl Message-ID: <20020704225009.A54167@dilbert.robbins.dropbear.id.au> In-Reply-To: <20020704121413.GB382@straylight.oblivion.bg>; from roam@ringlet.net on Thu, Jul 04, 2002 at 03:14:13PM %2B0300 References: <86sn2zpzmp.wl@daemon.musha.org> <20020704221031.A53275@dilbert.robbins.dropbear.id.au> <20020704121413.GB382@straylight.oblivion.bg>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 04, 2002 at 03:14:13PM +0300, Peter Pentchev wrote: > Are you sure that you do not have suidperl still hardlinked to 'perl', > exactly the hardlink that the first part of knu's patch removes? :) I just turned on the suid bit on /usr/bin/perl to test. The code in src/usr.bin/perl/perl.c isn't safe to run suid (or any time the effective user does not trust whoever set the PATH variable) because it runs arbitrary programs from directories in PATH. In any case, the way /usr/bin/perl relies on PATH to find the interpreter is unsafe to a lesser degree even with the suid bit turned off. Tim To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-audit" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020704225009.A54167>