[20610] in bugtraq
Re: Solaris /usr/bin/mailx exploit (SPARC)
daemon@ATHENA.MIT.EDU (Casper Dik)
Tue May 15 03:49:41 2001
Message-Id: <200105140824.KAA08664@romulus.Holland.Sun.COM>
To: Pablo Sor <psor@afip.gov.ar>
Cc: bugtraq@securityfocus.com, vuldb@securityfocus.com
In-reply-to: Your message of "Fri, 11 May 2001 10:51:59 EDT."
<3AFBFC8F.2189C0E7@afip.gov.ar>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Mon, 14 May 2001 10:24:10 +0200
From: Casper Dik <Casper.Dik@Sun.COM>
I'm not sure why all of the Solaris mail programs are actually set-gid
mail.
If you strip set-gid mail from /usr/bin/mail,, /usr/bin/mailx,
/usr/SUNWale/bin/mailx, /usr/dt/bin/dtmail, /usr/dt/bin/dtmailpr,
/usr/openwin/bin/mailtool nothing should break.
(At least not if you /var/mail directory has the standard 1777 permissions)
By forcing a file permission of 600 on mailboxes, group mail should not
gain you anything.
Casper