[14187] in bugtraq
Re: Corel Linux 1.0 dosemu default configuration: Local root vuln
daemon@ATHENA.MIT.EDU (Nate Eldredge)
Tue Mar 7 08:44:43 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <14530.56345.699613.823666@mercury.st.hmc.edu>
Date: Sun, 5 Mar 2000 14:13:45 -0800
Reply-To: Nate Eldredge <neldredge@HMC.EDU>
From: Nate Eldredge <neldredge@HMC.EDU>
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
I note that this has been added to the Vulnerabilities Database on
www.securityfocus.org (#1030) with the following solution:
> The system.com program should be removed from the dosemu heirarchy.
I don't think this is adequate. system.com is a fairly short file
(300 bytes), and if a user has any way to create files inside the
dosemu hierarchy (as they probably do, because otherwise dosemu is of
limited value), they can easily re-create it.
Correct fixes are listed at
http://www.dosemu.org/docs/README/0.98/README-3.html , the URL
referenced before. Such as setting secure mode in the configuration
files.
(Note that I haven't tested this as I can't reproduce the
vulnerability with my current dosemu configuration.)
--
Nate Eldredge
neldredge@hmc.edu