[3059] in bugtraq
Re: problems in /usr/Cadmin/bin for IRIX 5.3
daemon@ATHENA.MIT.EDU (Richard Chycoski)
Mon Aug 5 18:15:48 1996
Date: Mon, 5 Aug 1996 14:00:24 -0700
Reply-To: richard@sfu.ca
From: Richard Chycoski <richard@wizard.ucs.sfu.ca>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
>From: Grant Kaufmann <gkaufman@cs.uct.ac.za>
> I've stumbled onto a problem with /usr/Cadmin/bin/chost and
> /usr/Cadmin/bin/cimport.
> I'll post an exploit tomorrow, but I'd like to know why so many (17) programs in
> this directory are suid? They should only be run by root anyway.
>
> A quick fix is chmod -s /usr/Cadmin/bin/* .
>
> --
> Grant
Cadmin is known to be a major security hole. The reason for the suid programs is
that SGI has a mechanism to allow a user other than root to perform administrative
tasks on the machine. The implementation of this mechanism is quite flawed,
however, and your quick fix is the only way around it that I know of.
---
- Richard Chycoski
Senior Systems Consultant
Simon Fraser University
Academic Computing Services
richard@sfu.ca