Date: Mon, 20 Apr 1998 00:11:17 +0000 From: Niall Smart <rotel@indigo.ie> To: Peter Jeremy <Peter.Jeremy@alcatel.com.au>, freebsd-security@FreeBSD.ORG Subject: Re: suid/sgid programs Message-ID: <199804192311.AAA00447@indigo.ie> In-Reply-To: Peter Jeremy <Peter.Jeremy@alcatel.com.au> "Re: suid/sgid programs" (Apr 20, 7:29am)
next in thread | previous in thread | raw e-mail | index | archive | help
On Apr 20, 7:29am, Peter Jeremy wrote: } Subject: Re: suid/sgid programs > On Sun, 19 Apr 1998 20:45:30 +0000, Niall Smart <rotel@indigo.ie> wrote: > >> But if someone can break the uid that lpr runs as then they can probably > >> break root anyway. > >How? > > Well, as a starter, lp{q,r,rm} are setuid root, therefore by > definition once you've broken `the uid that lpr runs as', you've > broken root :-) The above discussion was in the context of lp* which weren't setuid root. > Assuming they were setuid something else, the simplest way is with a > couple of trojan lp binaries: as soon as root root prints something, > you've got root access. It may also be possible to get in via lpd > (which is started as root, but needs to run as `lp'. As Marc Slemko has just pointed out, you can use schg to prevent this, as was done with man(1). Niall -- Niall Smart. PGP: finger njs3@motmot.doc.ic.ac.uk FreeBSD: Turning PC's into Workstations: www.freebsd.org Annoy your enemies and astonish your friends: echo "#define if(x) if (!(x))" >> /usr/include/stdio.h To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199804192311.AAA00447>