[20785] in bugtraq
Re: in.fingerd follows sym-links on Solaris 8
daemon@ATHENA.MIT.EDU (Joep Vesseur)
Mon May 28 16:23:24 2001
Message-Id: <200105251640.f4PGe6A20741@enigma.holland.sun.com>
From: Joep.Vesseur@Sun.COM (Joep Vesseur)
To: Lukasz Luzar <lluzar@developers.of.pl>
Cc: bugtraq@securityfocus.com
In-Reply-To: Message from Lukasz Luzar <lluzar@developers.of.pl>
of "Fri, 25 May 2001 09:19:59 +0200." <Pine.LNX.4.33.0105250859240.12470-100000@unix.developers.of.pl>
Date: Fri, 25 May 2001 18:40:01 +0200
Lukasz,
> I think about a case where a CGI script saves some important
> information in a temporary file, like PHP do with the sessions:
>
> -rw------- 1 nobody nobody 329 May 14 12:16 /tmp/sess_0cd156a633
>
> When you have installed in.fingerd, and the in.fingerd is vulnerable,
> all local users are able to read the information from the files.
You should not run multiple daemons using the same 'unprivileged'
account. Nobody itself is an extreemly poor choice since the sole
intention of nobody's introduction was to map root to an unprivileged
account when accessing files over NFS.
Run your http daemon as user http (or something like that), and this
problem disappears.
Joep