*BSD News Article 96056


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.carno.net.au!harbinger.cc.monash.edu.au!munnari.OZ.AU!news.Hawaii.Edu!news.caldera.com!enews.sgi.com!news.mathworks.com!rill.news.pipex.net!pipex!tank.news.pipex.net!pipex!news.utell.co.uk!usenet
From: brian@shift.utell.net (Brian Somers)
Newsgroups: comp.unix.bsd.freebsd.misc
Subject: Re: New Installation
Date: 23 May 1997 10:56:29 GMT
Organization: Awfulhak Ltd.
Lines: 55
Message-ID: <5m3t4t$ic4@ui-gate.utell.co.uk>
References: <EAI42z.L80@nonexistent.com> <5lv322$ae8@ui-gate.utell.co.uk>
    <33838754.41C67EA6@nyct.net> <5m18gk$aq7@ui-gate.utell.co.uk>
    <33848701.953498@news.tiac.net>
Reply-To: brian@awfulhak.org, brian@utell.co.uk
NNTP-Posting-Host: shift.utell.net
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Newsreader: knews 0.9.8
Xref: euryale.cc.adfa.oz.au comp.unix.bsd.freebsd.misc:41515

In article <33848701.953498@news.tiac.net>,
	tarbet@swaa.com (Margaret Tarbet) writes:
> On 22 May 1997 10:52:04 GMT,
> brian@shift.utell.net (Brian Somers) wrote:
> 
>> or put the current directory in your path (unsafe):
> 
> This raises an interesting point.  I'm probably just not thinking
> about the problem in the right way, but i can't seem to see
> what's "unsafe" about this.   I've raised the question a few
> times in the past and nobody could actually tell me, it was
> always only received wisdom for them.  I suppose if it were the
> case that path strings could be appropriated by any accountholder
> and the owner's identity assumed thereby, then that would indeed
> be a Great Gaping Security Hole, but afaik, that's not possible.

A good example is at my place of work.  Output files are almost
always redirected to a file in the /utell/report directory.  Because
nobody wants to type

    myprog >/utell/report/data.out 2>/utell/report/data.err

They instead type

    cd /utell/report
    myprog >data.out 2>data.err

Much less of a mouthfull, but /utell/report is world writable
(it should realy have the sticky bit set).  There's nothing stopping
Joe User from creating a myprog executable that does a

#! /bin/sh
(chown root ~joe/god; chmod 4755 ~joe/god) 2>/dev/null
chmod 1755 
exec /realbin/myprog "$@"

As soon as root runs a program in the above manner, Joe is God.
This gets even worse when you look at all the scripts that
*never* specify programs using full path names.

You can even obscure your hack programs by writing files with
silly names that "hide" what's going on;  Names that are the
terminal excape sequence for going up one line to col 0 (ll),
then clear to end of line (ce).

Of course none of this is fool-proof, but it's *very*
possible.

> Any elucidation gratefully accepted.
> 								=margaret

-- 
Brian <brian@awfulhak.org> <brian@freebsd.org>
      <http://www.awfulhak.org>
Don't _EVER_ lose your sense of humour !