[20785] in bugtraq

home help back first fref pref prev next nref lref last post

Re: in.fingerd follows sym-links on Solaris 8

daemon@ATHENA.MIT.EDU (Joep Vesseur)
Mon May 28 16:23:24 2001

Message-Id: <200105251640.f4PGe6A20741@enigma.holland.sun.com>
From: Joep.Vesseur@Sun.COM (Joep Vesseur)
To: Lukasz Luzar <lluzar@developers.of.pl>
Cc: bugtraq@securityfocus.com
In-Reply-To: Message from Lukasz Luzar <lluzar@developers.of.pl> 
   of "Fri, 25 May 2001 09:19:59 +0200." <Pine.LNX.4.33.0105250859240.12470-100000@unix.developers.of.pl> 
Date: Fri, 25 May 2001 18:40:01 +0200

Lukasz,

>  I think about a case where a CGI script saves some important
>  information in a temporary file, like PHP do with the sessions:
> 
>   -rw------- 1 nobody nobody    329 May 14 12:16  /tmp/sess_0cd156a633
> 
>  When you have installed in.fingerd, and the in.fingerd is vulnerable,
>  all local users are able to read the information from the files.

You should not run multiple daemons using the same 'unprivileged'
account. Nobody itself is an extreemly poor choice since the sole
intention of nobody's introduction was to map root to an unprivileged
account when accessing files over NFS.

Run your http daemon as user http (or something like that), and this
problem disappears.

Joep

home help back first fref pref prev next nref lref last post