[8411] in bugtraq
Re: lightbar vulnerability
daemon@ATHENA.MIT.EDU (Aaron Bornstein)
Wed Nov 4 20:32:41 1998
Date: Wed, 4 Nov 1998 06:05:51 -0500
Reply-To: Aaron Bornstein <aaronb@MOJO.CALYX.NET>
From: Aaron Bornstein <aaronb@MOJO.CALYX.NET>
X-To: Config Urator <root@OBERPHLOW.ORG>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <Pine.LNX.3.96.981101210313.7357A-100000@lil_core.l1l_core>
On Sun, 1 Nov 1998, Config Urator wrote:
> - How do i make sure sum1 dont use this against me?
>
> easy, just make sure no1 can erase or change permissons of the
> file that "guest" account will execute.
>
While I suppose it's somewhat against the rules of paranoia for
the program to not die upon discovering the code it's supposed to execute
is modifiable by non-priveleged users, it speaks volumes for the silliness
of the security policies that would allow such a thing to happen in the
first place.
"Hey, look, I changed ownership of /etc/inetd.conf to this
unpriveleged user and all of a sudden s/he got root on my machine! Must
be a hole in inetd!"
My $.02.
--
Aaron Bornstein
http://mojo.calyx.net/~aaronb/
aaronb at calyx dot net | aaronmb at mit dot edu