[414] in WWW Security List Archive
Unix NCSA httpd Vulnerability
daemon@ATHENA.MIT.EDU (Michael Pellmann)
Fri Feb 17 10:40:49 1995
Date: Fri, 17 Feb 1995 12:50:11 +0100
To: www-security@ns2.rutgers.edu
From: pel@adv.magwien.gv.at (Michael Pellmann)
Reply-To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu
I think we hit another bug within NCSA httpd 1.3. In the last days I got
complaints that a few services in out internal WWW do not work any more.
When I checked it I found that all these services were using csh, which
reported csh: permission denied. A deeper investigation showed, that the
http was running as ROOT/STAFF (!!!), forking the CGIs as root (csh does
not like this). Restarting via signal -1 did not change anything, only
killing and restarting from scratch brought us back to nobody. Since the
httpd has been running for over 2 weeks, at the beginning definitely as
nobody, there must have been some incident which let http switch back to
root. We have no idea about this, but are very alarmed.
Any comments ???
cu Michael
_
|\/| |_) | X.400: C=AT,A=ADA,P=MAGWIEN : City of Vienna
| |ichael | ellmann | O=MAGWIEN,OU=ADV *
-----------------------| eMail: pel@magwien.gv.at :*: M D - A D V
MD-ADV / Rathausstr.1 | FAX : ++43-1-4000-7141 ***______:
1082 Vienna / Austria | FIDO: 2:310/3.20 **********