[1878] in bugtraq

home help back first fref pref prev next nref lref last post

Re: From the moderator: READ Please

daemon@ATHENA.MIT.EDU (smb@research.att.com)
Mon May 22 15:56:43 1995

From: smb@research.att.com
To: Claudio Telmon <claudio@fire.di.unipi.it>
Cc: bugtraq@crimelab.com
Date: Mon, 22 May 95 14:13:02 EDT

	 1) Some new releases of sendmail install the program as group kmem.

	 I can't see any good reason for this, if I'm wrong please
	 correct me. This group is dangerous, because it is able to
	 read the kernel and physical memory.  I was able to get a
	 shell as group kmem via the old ident bug, and to find some
	 fragments of the shadow passwords file in the kernel memory.
	 Newer bug s may give the same opportunity.

Sendmail tries to determine the load average of the machine; on some
platforms, the only way to do that is by reading /dev/kmem.  That doesn't
change the fact that it's stupid to give sendmail that much power.  (On
the other hand, it's already setuid root; what does yet one more
privilege matter....?)

home help back first fref pref prev next nref lref last post