[20610] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris /usr/bin/mailx exploit (SPARC)

daemon@ATHENA.MIT.EDU (Casper Dik)
Tue May 15 03:49:41 2001

Message-Id: <200105140824.KAA08664@romulus.Holland.Sun.COM>
To: Pablo Sor <psor@afip.gov.ar>
Cc: bugtraq@securityfocus.com, vuldb@securityfocus.com
In-reply-to: Your message of "Fri, 11 May 2001 10:51:59 EDT."
             <3AFBFC8F.2189C0E7@afip.gov.ar> 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Mon, 14 May 2001 10:24:10 +0200
From: Casper Dik <Casper.Dik@Sun.COM>



I'm not sure why all of the Solaris mail programs are actually set-gid 
mail.

If you strip set-gid mail from /usr/bin/mail,, /usr/bin/mailx, 
/usr/SUNWale/bin/mailx, /usr/dt/bin/dtmail, /usr/dt/bin/dtmailpr,
/usr/openwin/bin/mailtool nothing should break.

(At least not if you /var/mail directory has the standard 1777 permissions)


By forcing a file permission of 600 on mailboxes, group mail should not
gain you anything.

Casper


home help back first fref pref prev next nref lref last post