[18546] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Glibc Local Root Exploit

daemon@ATHENA.MIT.EDU (Jerry Connolly)
Wed Jan 10 21:25:16 2001

Mail-Followup-To: Jerry Connolly <jerry.connolly@eircom.net>,
                  BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id:  <20010110234752.A32228@alpha.eng.eircom.net>
Date:         Wed, 10 Jan 2001 23:47:52 +0000
Reply-To: Jerry Connolly <jerry.connolly@EIRCOM.NET>
From: Jerry Connolly <jerry.connolly@EIRCOM.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.BSI.4.05L.10101101335100.24087-100000@mail.eclipse.net>;
              from pedro@ECLIPSE.NET on Wed, Jan 10, 2001 at 01:40:39PM -0500

Pedro Margate said the following on Wed, Jan 10, 2001 at 01:40:39PM -0500,
> The implementations of ssh that I'm familiar with (ssh and OpenSSH)
> install the ssh binary as suid root by default.  This can be disabled
> during configuration or after the fact with chmod.  I believe that would
> prevent this exploit from operating.  I've turned off the suid bit on
> every ssh installation I've performed and it seems to work the same.  I'm
> not sure what reason ssh has to be suid root, nobody I've asked has any
> idea.

If you have the following options set in ssh_config
   RhostsAuthentication yes
   RhostsRSAAuthentication yes
   UsePrivilegedPort yes
then ssh will connect from a privileged port, which requires root privileges.


Jerry Connolly, Eircom.net CIRT
--
ejrry^[bxpZZ

home help back first fref pref prev next nref lref last post