Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 16 Oct 2005 11:58:34 +0200
From:      Jimmy Scott <jimmy@inet-solutions.be>
To:        Kris Kennaway <kris@obsecurity.org>
Cc:        freebsd-security@freebsd.org, Mathieu Arnold <mat@mat.cc>, Stephen Major <smajor@gmail.com>
Subject:   Re: GID Games Exploits
Message-ID:  <20051016095834.GA29631@ada.devbox.be>
In-Reply-To: <20051016090445.GA7572@xor.obsecurity.org>
References:  <4351d9bd.6245f154.4f04.ffffb6ef@mx.gmail.com> <20051016044712.GA27867@xor.obsecurity.org> <4FB7164D6E6041F49E3BEE97@cc-126-240.int.t-online.fr> <20051016085319.GA11795@ada.devbox.be> <20051016090445.GA7572@xor.obsecurity.org>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Sun, Oct 16, 2005 at 05:04:45AM -0400, Kris Kennaway wrote:
> 
> On Sun, Oct 16, 2005 at 10:53:19AM +0200, Jimmy Scott wrote:
> > On Sun, Oct 16, 2005 at 10:15:23AM +0200, Mathieu Arnold wrote:
> > > 
> > > +-le 16/10/2005 00:47 -0400, Kris Kennaway ?crivait :
> > > | On Sat, Oct 15, 2005 at 09:39:27PM -0700, Stephen Major wrote:
> > > |> It has come to my attention that there are quite a few local exploits
> > > |> circling around in the private sector for GID Games.
> > > |> 
> > > |>  
> > > |> 
> > > |> Several of the games have vanilla stack overflows in them which can lead to
> > > |> elevation of privileges if successfully exploited.
> > > | 
> > > | Big deal..that's why they're setgid games (which can only write to
> > > | game data files) and not setuid anything important :-)
> > > 
> > > It means that I can change my own score to something better, that's very
> > > important :-)
> > 
> > No ! It means you could access directory trees where your own group
> > would not have access to, for example on freeshell.org:
> > 
> > [sdf] ~> ls -al /usr/pkg/bin/perl                                                
> > -rwx---r-x  2 root  users  22246 Aug  7 11:16 /usr/pkg/bin/perl
> > 
> > Groups are frequently used for negative permissions, because ACL's would
> > be overkill or not possible on the filesystem in question.
> 
> It's not overkill when the alternative is a security model that is too
> fragile or limited to handle your needs.  Unprivileged users/groups
> like 'nobody' and 'games' are supposed to be unprivileged, not have
> extra privileges that normal users don't get, which is the case in the
> above misuse of groups.
> 

I agree this is not a good practice at all, but it is a lot used in
environments where there are clients with no ACL support yet. Or you
don't want the extra ACL support for one directory (and are aware of
these risks, but people aren't; which is explained later).

My point of view is "you don't have ACL's available", which is still the
default as I remember.

> The solution is not to give those entities extra privileges: either
> use ACLs, or don't install games since they violate your intended
> security policy.
> 

Your solution is correct, but it is not documented in the handbook or
the security(7) manpage as I can remember, correct me if I'm wrong.

> Kris

-- 
People usually get what's coming to them ... unless it's been mailed.

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (OpenBSD)

iD8DBQFDUiRKgDLTDEgDPT0RAgZ+AJ9D7upjB6Ie2CQ3mM4Vd8H7m6BOuwCaAtpA
ZmjtaS1KTM8xheqlpRvh9wE=
=bm0h
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20051016095834.GA29631>