[9075] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ff.core exploit on Solaris (2.)7

daemon@ATHENA.MIT.EDU (Casper Dik)
Fri Jan 15 12:54:44 1999

Date: 	Fri, 15 Jan 1999 14:20:36 +0100
Reply-To: Casper Dik <casper@HOLLAND.SUN.COM>
From: Casper Dik <casper@HOLLAND.SUN.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Your message of "Fri, 08 Jan 1999 12:43:20 EST." 
              <Pine.GSO.4.05.9901081235340.880-100000@naur.csee.wvu.edu>

>Greetings,
>        Confirmed ff.core exploit does exist in Solaris 7, server
>edition.  System is straight installation, no patches of any category
>available for 7 from Sunsolve yet.


There's another workaround for the "ff.core" bug rather than taking away
it's set-uid permissions.

The workaround is:

        chmod a-w /vol/*

(Best added to the volmgt starup script in the following fashion, after the
line that starts vold:


                while sleep 1
                do
                        if [ -d /vol/rmt ]
                        then
                                chmod a-w /vol/*
                                break
                        fi
                done &


This leaves a 1 second window or so of vulnerability at boot time which you
can prevent by starting vold earlier than cron & inetd.


Casper

home help back first fref pref prev next nref lref last post