[2878] in bugtraq

home help back first fref pref prev next nref lref last post

Re: BoS: Re: Solaris mailx hole

daemon@ATHENA.MIT.EDU (Travis Hassloch x231)
Tue Jul 2 15:31:04 1996

Date: 	Tue, 2 Jul 1996 14:10:28 -0500
Reply-To: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
From: Travis Hassloch x231 <travis@EvTech.com>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To:  Your message of "Tue, 02 Jul 1996 01:08:49 EDT."
              <Pine.SUN.3.91.960702005934.18788A-100000@bigdog.fred.net>

In message <Pine.SUN.3.91.960702005934.18788A-100000@bigdog.fred.net> you write
:
>         echo "localhost $USER" | /bin/mail $TARGET

This line should be preceeded somewhere in the script by a line
which sets $USER:

USER=`whoami`

>         2. We have considered several potential workarounds for this
>            vulnerability.  The ideal fix would be to remove global write
>            access to the mail spool directory.  However, this is not
>            possible as programs such as /bin/mail, /usr/ucb/Mail and
>            elm require everyone to have write access.  Also it is not

                        or to be sgid-mail.

>            possible to, for example, change the group ownership of
>            /var/spool/mail to mail and give /bin/mail and /usr/ucb/Mail
>            setgid mail privilege, as they do not reset their group id
>            before forking a shell.

             Unless you have sources and can fix them.

>            i. Ensure that every user maintains a mailbox file.  The
>               following program will create a mailbox for every user
>               on the system, if one does not currently exist.

  Would it also suffice to have an alias for each such user?

home help back first fref pref prev next nref lref last post