[12118] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Fwd: Truth about ssh 1.2.27 vulnerabiltiy]

daemon@ATHENA.MIT.EDU (Sylvain Robitaille)
Tue Oct 5 13:54:33 1999

Message-Id:  <199910041636.MAA07964@alcor.concordia.ca>
Date:         Mon, 4 Oct 1999 12:36:59 -0400
Reply-To: Sylvain Robitaille <syl@ALCOR.CONCORDIA.CA>
From: Sylvain Robitaille <syl@ALCOR.CONCORDIA.CA>
X-To:         Chris.Keane@COMLAB.OX.AC.UK
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <19991001193920.1.29734.qmail@userpc16.comlab.ox.ac.uk>

Chris Keane wrote:

> Surely this still isn't ideal, though?  It now won't overwrite root-owned
> files, so the security hazard isn't there, but anyone on the system can
> still fool a user into overwriting one of his own files, which is not
> great.

No. The code in newchannels.c checks to make sure that the directory
where the socket is about to be created is owned by the user, and
readable/writable only to this user. A user could create a symbolic
link that points to some file in a directory they already have write
permission to, but that's no big feat. (Existing files aren't
overwritten by bind() either, even when symlinks are followed. If the
symlink target exists, bind() returns "address in use". At least that's
the case on Digital Unix.)

Jeff's patch implements an approach that Dan Astoorian suggested to me
off the list, and we both agree it is a reasonable approach.

--
----------------------------------------------------------------------
Sylvain Robitaille                              syl@alcor.concordia.ca

Systems Manager                                   Concordia University
Instructional & Information Technology        Montreal, Quebec, Canada
----------------------------------------------------------------------

home help back first fref pref prev next nref lref last post