[2040] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Security Problem ftpd (includes wu.ftpd 2.4 and 2.4.2 beta 4)

daemon@ATHENA.MIT.EDU (Lyndon Nerenberg)
Thu Jul 13 14:00:19 1995

Date:         Wed, 12 Jul 1995 23:35:25 -0700
Reply-To: Bugtraq List <BUGTRAQ@CRIMELAB.COM>
From: Lyndon Nerenberg <lyndon@multivac.orthanc.com>
X-To:         Bugtraq List <BUGTRAQ@CRIMELAB.COM>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@CRIMELAB.COM>
In-Reply-To:  Your message of "Wed, 12 Jul 1995 13:58:34 PDT."
              <199507122058.NAA18469@hiroaki.nbs.nau.edu>

"James W. Abendschan" writes:

>Maybe I'm completely missing the point, but wouldn't this help?
>
>        linux# chown root.kmem /proc
>        linux# chmod 750 /proc
>
>And then sgid kmem all the binaries that need /proc access:

One of the big reasons for having /proc is to simplify the interface
for debuggers. Doing this means setgid dbx/gdb/adb/...

Wouldn't it be better to have files in /proc export the owner/group/perm
bits of the underlying file (where applicable), with a further restriction
that write access follow the semantics of ptrace(2)? Or perhaps have
/proc/pid/* use the underlying perms, but restrict /proc/pid/fd/* to
being writable only by the current process and the parent as per ptrace(2)?
Of course, write access to /proc/pid/mem effectively bypasses any
additional restrictions placed on /proc/pid/fd/*.

--lyndon

home help back first fref pref prev next nref lref last post