[10415] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Possible Linuxconf Vulnerability

daemon@ATHENA.MIT.EDU (Patrick J. Volkerding)
Mon May 3 18:39:10 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.BSI.3.96.990501135547.25234B-100000@rrnet.com>
Date: 	Sat, 1 May 1999 14:03:25 -0500
Reply-To: "Patrick J. Volkerding" <gonzo@RRNET.COM>
From: "Patrick J. Volkerding" <gonzo@RRNET.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <372ADB4E.11C469CA@nwlink.com>

On Sat, 1 May 1999, Desync wrote:

> Where do you draw the line between poor system managment and exploitable
> programs. If I set suid root on /bin/bash, is that to say its an
> exploit?
>
> Obviously, someone would have to remove clock for this to occur. Which
> would conclude that either A) you had incorrect permissions for clock B)
> they had allready used some means of another true exploit to cause other
> program to misbehave.

Not necessarily.  Maybe there was never a 'clock' on the system to begin
with;  since the real 'clock' binary was phased out of the util-linux
sources a year or so ago, what you get varies by Linux distribution.  On
Red Hat, 'clock' is a symbolic link to 'hwclock', a newer utility.  On
Slackware, we continue to maintain a 'clock' binary as part of our
util-linux package (in addition to the newer 'hwclock').  Other
distributions may not provide any binary or link for 'clock', relying
solely on 'hwclock'.

Take care,

Pat

home help back first fref pref prev next nref lref last post