[2460] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ufsrestore suid root not a security hole

daemon@ATHENA.MIT.EDU (mulligan@future.incog.com)
Sat Dec 16 07:56:15 1995

Date:         Fri, 15 Dec 1995 23:55:50 -0700
Reply-To: mulligan@incog.com
From: mulligan@future.incog.com
X-To:         Bugtraq List <BUGTRAQ@CRIMELAB.COM>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@CRIMELAB.COM>
In-Reply-To:  Your message of "Tue, 12 Dec 1995 00:39:30 PST."
              <199512120839.AAA14219@netcom20.netcom.com>

Ed wrote:
>         BUT, it will let you read ANY file from the tape. Including
>         root owned files such as /etc/shadow.
>
>         * Know when UNIX admins runs backups.
>         * Extract files with ufsrestore (/etc/shadow)
>         * Run Crack.
>         * Or you could be reading root's mail, CEO email ...etc,etc
[ script of reading tape deleted ]

Come on Ed.  This isn't a ufsrestore problem!  If folks can get access
to your backup tapes you are hosed.  They don't need to use ufsrestore
(setuid or not) to read them.  They can just read the raw tape if they
want to and what ever is there.  This isn't any agument against
ufsrestore -- it's an argument to physically protect your backup tapes.

        geoff

home help back first fref pref prev next nref lref last post