[1903] in bugtraq

home help back first fref pref prev next nref lref last post

Re: linux atrun

daemon@ATHENA.MIT.EDU (bt)
Tue May 23 15:49:39 1995

Date: Tue, 23 May 1995 10:55:56 -0700 (PDT)
From: bt <bt@cyberflunk.semaphore.com>
To: Claudio Telmon <claudio@fire.di.unipi.it>
Cc: bugtraq@crimelab.com
In-Reply-To: <199505220903.LAA10036@fire.di.unipi.it>



On Mon, 22 May 1995, Claudio Telmon wrote:

> 2) There is a (known?) way to run an arbitrary script files as suid/sgid 
> without the neeed to set the permissions bits. 
> All you need is write permissions in the /var/spool/atjobs directory. 
> This because atrun uses the user/group of the files in the directory to 
> suid/sgid before execution. If you can add a link in the directory to your 
> target file, atrun will execute it as suid/sgid.

I saw something about this the otherday.. this is from the guy that 
wrote it i think.. most major linux distributions have version 2.7

--->

Earlier versions of my at/atrun package for Linux had a bug which
allowed root access for any authorized user of the system.

This bug can only be exploited if the user can edit a job he's
submitted to the atrun queue.

If 'at -V' shows a version earlier than 2.7, or if the directory
/var/spool/atjobs (or, possibly, /usr/spool/atjobs) is world -
executable, you are vulnerable.

In that case, upgrade your system to at 2.7 or 2.7a immediately.

In the meantime, changing the permissions of /var/spool/atjobs to 700
will prevent unauthorized root access; this may also render the
'at' system unusable.


home help back first fref pref prev next nref lref last post