[16430] in bugtraq

home help back first fref pref prev next nref lref last post

Re: RH 6.1 / 6.2 minicom vulnerability

daemon@ATHENA.MIT.EDU (Sylvain Robitaille)
Wed Aug 30 14:11:40 2000

Message-ID:  <200008300057.UAA18268@alcor.concordia.ca>
Date:         Tue, 29 Aug 2000 20:57:45 -0400
Reply-To: Sylvain Robitaille <syl@ALCOR.CONCORDIA.CA>
From: Sylvain Robitaille <syl@ALCOR.CONCORDIA.CA>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <39A2D8E7.AC296DCB@valleylocal.com>

Ben Lull wrote:

> ... Yep Slackware (7.x) too using minicom 1.82 and 1.82.1

Just for the record, I checked with Slackware-4, which also has
minicom-1.82, (but I've already changed mine to be setgid "modem" so it
has only permission to write to the modem device).

One thing Ben's example didn't show is confirmation that this problem
follows symlinks on his system, and creates the file accoring to the
umask, which I've found to be the case on mine:

  : charlotte[syl] ~; ln -s /tmp/foo .
  : charlotte[syl] ~; ( umask 2 ; minicom -C foo )
  minicom: cannot open /dev/ttyS1: Permission denied
  : charlotte[syl] ~; ls -l /tmp/foo
  -rw-rw-r--   1 syl      modem           0 Aug 29 20:44 /tmp/foo

Lessons learned:

- don't install UUCP commands unless you actually need them, (and most
  people really don't anymore. If you install UUCP commands, *know* what
  other programs will run with the same privileges.
- go through your system after installation and reduce permissions to
  only what's required.  There's nothing on my system that would be
  writable to group modem, except of course the modem device.

--
----------------------------------------------------------------------
Sylvain Robitaille                              syl@alcor.concordia.ca

Systems analyst                                   Concordia University
Instructional & Information Technology        Montreal, Quebec, Canada
----------------------------------------------------------------------

home help back first fref pref prev next nref lref last post