Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Nov 2003 11:36:08 -0500 (EST)
From:      Matt Piechota <piechota@argolis.org>
To:        Mike Tancsa <mike@sentex.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: perms of /dev/uhid0 
Message-ID:  <20031126113319.Q16087@cithaeron.argolis.org>
In-Reply-To: <6.0.1.1.0.20031126104757.034e1988@209.112.4.2>
References:  <6.0.1.1.0.20031126101602.06e8e9f0@209.112.4.2> <6.0.1.1.0.20031126104757.034e1988@209.112.4.2>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 26 Nov 2003, Mike Tancsa wrote:

> I know for our setup, there is nothing else that would need to talk to this
> device so I could do something like that.  Not sure of the implications if
> someone unplugged the UPS and put their own device into the port.  The
> physical server is in a locked box, but the UPS is not. So if they somehow
> managed to blow up the daemon by overflowing a buffer, it would be nice
> that its a non root user.  However, I do not try and read more than
> sizeof(buffer) so I dont see any obvious ways...

Looking at /etc/usbd.conf, it appears that you can specify what USB Manuf
and Device ID the UPS is, so it'd only chgrp stuff when the device was the
UPS.  I suppose that wouldn't stop someone who changed their device IDs to
match the UPS, but that seems like a minimal risk.

-- 
Matt Piechota



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20031126113319.Q16087>