[12306] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Re: xmonisdn (isdn4k-utils/Linux) bug report]

daemon@ATHENA.MIT.EDU (Antonomasia)
Thu Oct 21 15:28:38 1999

Message-Id:  <199910202133.WAA06914@notatla.demon.co.uk>
Date:         Wed, 20 Oct 1999 22:33:45 +0100
Reply-To: Antonomasia <ant@NOTATLA.DEMON.CO.UK>
From: Antonomasia <ant@NOTATLA.DEMON.CO.UK>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

From: Brock Tellier <btellier@USA.NET>

> >This was my try to exploit myself. When I make the 'killall -8 xmonisdn' >my
> >xmonisdn dies only with an Floating exception but it doesn't dump a core.

> Good, it shouldn't. If you look at the original post, this person executed
> those commands as root, which, on his system, allowed him to make the suid
> xmonisdn dump core.  xmonisdn won't dump core unless you are running it as
> root.  This isn't a security hole unless it were to dump core in a world
> readable mode.

Or in a directory writable by others, in which case files could get trashed.

With O_NOFOLLOW in the core file open(), as it is in recent kernels, you
now require hard links rather than symbolic links to achieve this.
I've put O_EXCL in some of my kernels for this reason.

--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################

home help back first fref pref prev next nref lref last post