Date: Tue, 08 Aug 2000 23:56:12 +0100 From: Brian Somers <brian@Awfulhak.org> To: Kris Kennaway <kris@FreeBSD.org> Cc: Brian Somers <brian@FreeBSD.org>, cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org, brian@Awfulhak.org Subject: Re: cvs commit: src/etc rc Message-ID: <200008082256.XAA03062@hak.lan.Awfulhak.org> In-Reply-To: Message from Kris Kennaway <kris@FreeBSD.org> of "Tue, 08 Aug 2000 15:24:52 PDT." <Pine.BSF.4.21.0008081521460.95705-100000@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> On Tue, 8 Aug 2000, Brian Somers wrote:
>
> > brian 2000/08/08 06:30:28 PDT
> >
> > Modified files:
> > etc rc
> > Log:
> > Don't use find(1) before nfs filesystems have been mounted as
> > it lives in /usr/bin. Instead, locate files manually.
> >
> > Note, only *files* under /var/spool/lock are now deleted rather
> > than everything that's not a directory. I think this is more
> > correct, but if anyone disagrees please feel free to change it.
>
> This is vulnerable to filenames with spaces in them and the like. Granted,
> the directory is not world-writable, but we've had several "group dialer"
> or "user uucp" exploits in ports.
>
> morden# ls -ld /var/spool/lock
> drwxrwxr-x 2 uucp dialer 512 Aug 8 14:26 /var/spool/lock
How is it vulnerable to files with spaces ? I have specifically
tested this with filenames containing embedded spaces and ^Hs and the
like.
The only vulnerability I'm aware of is the time difference between
identifying it as a file and removing it, and that's not an issue as
there are not yet any users.
> Kris
>
> --
> In God we Trust -- all others must submit an X.509 certificate.
> -- Charles Forsythe <forsythe@alum.mit.edu>
--
Brian <brian@Awfulhak.org> <brian@[uk.]FreeBSD.org>
<http://www.Awfulhak.org> <brian@[uk.]OpenBSD.org>
Don't _EVER_ lose your sense of humour !
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200008082256.XAA03062>
