[8411] in bugtraq

home help back first fref pref prev next nref lref last post

Re: lightbar vulnerability

daemon@ATHENA.MIT.EDU (Aaron Bornstein)
Wed Nov 4 20:32:41 1998

Date: 	Wed, 4 Nov 1998 06:05:51 -0500
Reply-To: Aaron Bornstein <aaronb@MOJO.CALYX.NET>
From: Aaron Bornstein <aaronb@MOJO.CALYX.NET>
X-To:         Config Urator <root@OBERPHLOW.ORG>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.3.96.981101210313.7357A-100000@lil_core.l1l_core>

On Sun, 1 Nov 1998, Config Urator wrote:

> - How do i make sure sum1 dont use this against me?
>
>         easy, just make sure no1 can erase or change permissons of the
> file that "guest" account will execute.
>

        While I suppose it's somewhat against the rules of paranoia for
the program to not die upon discovering the code it's supposed to execute
is modifiable by non-priveleged users, it speaks volumes for the silliness
of the security policies that would allow such a thing to happen in the
first place.

        "Hey, look, I changed ownership of /etc/inetd.conf to this
unpriveleged user and all of a sudden s/he got root on my machine!  Must
be a hole in inetd!"

My $.02.


--
Aaron Bornstein
http://mojo.calyx.net/~aaronb/
aaronb at calyx dot net | aaronmb at mit dot edu

home help back first fref pref prev next nref lref last post