[13275] in bugtraq

home help back first fref pref prev next nref lref last post

Re: majordomo local exploit

daemon@ATHENA.MIT.EDU (Chan Wilson)
Fri Jan 7 13:31:37 2000

Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <20000107162732N.cwilson@unknown-domain>
Date:         Fri, 7 Jan 2000 16:27:32 +0100
Reply-To: Chan Wilson <cwilson@NEU.SGI.COM>
From: Chan Wilson <cwilson@NEU.SGI.COM>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

>   The following patch, built upon code and suggestions submitted by
> Henrik Edlund, Henrik Nordstrom, and Andrew Brown, is intended to render
> safe the config file requires, in the seven scripts which use them, in
> the Majordomo 1.94.4 home directory. It also incorporates Todd Miller's
> patch of Dec. 29.

This doesn't address the problem on Unixen that allow one to 'give
away' files.  Nor is it compatible with the philosophy that majordomo
1.x should continue to run under perl4.

The proper fix appears to be simply 'chmod 0750 wrapper', perhaps
along with setting the group owner of wrapper to the same as the MTA.

And, of course, restricting access to the majordomo server.

--Chan
	majordomo maintainer.

home help back first fref pref prev next nref lref last post