[20636] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris /usr/bin/mailx exploit (SPARC)

daemon@ATHENA.MIT.EDU (Andrew Hilborne)
Tue May 15 15:29:11 2001

To: Casper Dik <Casper.Dik@Sun.COM>
Cc: bugtraq@securityfocus.com, vuldb@securityfocus.com
From: Andrew Hilborne <andrew.hilborne@uk.xo.com>
Date: 15 May 2001 14:15:45 +0100
In-Reply-To: Casper Dik's message of "Mon, 14 May 2001 10:24:10 +0200"
Message-ID: <uag0e692im.fsf@sapphire.noc.gxn.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii

Casper Dik <Casper.Dik@Sun.COM> writes:

> I'm not sure why all of the Solaris mail programs are actually set-gid 
> mail.
> 
> If you strip set-gid mail from /usr/bin/mail,, /usr/bin/mailx, 
> /usr/SUNWale/bin/mailx, /usr/dt/bin/dtmail, /usr/dt/bin/dtmailpr,
> /usr/openwin/bin/mailtool nothing should break.
> 
> (At least not if you /var/mail directory has the standard 1777 permissions)
> 
> By forcing a file permission of 600 on mailboxes, group mail should not
> gain you anything.

Just how do you force 0600 on mailboxes which don't exist (many MUAs remove
empty mailboxes?)

Since you cannot easily do this, at the very least a malicious user should be
able to steal other users' mail. I think.

--
Andrew Hilborne

home help back first fref pref prev next nref lref last post