[580] in SIPB_Linux_Development

home help back first fref pref prev next nref lref last post

Re: telnetd/login hole

daemon@ATHENA.MIT.EDU (Salvatore Valente)
Sun May 22 22:30:30 1994

Date: Sun, 22 May 94 22:30:12 -0400
To: linux-dev@MIT.EDU
In-Reply-To: "[576] in SIPB_Linux_Development"
From: Salvatore Valente <svalente@MIT.EDU>


The original report:

> The problem lies with /bin/login: whenever someone passes the
> -f flag to /bin/login, the user will be logged in without prompting for a
> password.

The original fix:

> It executes /bin/login.prg (the original login program) after removing any
> -f flags from the arguments.

Ted suggests that the fix could be better:

> Note that this isn't a login security hole, but is properly a telnetd
> security hole.  The login -f flag is useful, after all....

The second report:

> Basically you can login as root from the console or by telnet without
> a password type typing:
> "login -f root" from the console

Which makes it sound like the "login -f" flag is a bit _more_ useful
then it really should be...  :-)

Well, none of the Linux systems I use were affected by this, but I'm
curious: does anyone know _exactly_ where the hole was?  I guess the
first question is: what is the "login -f" flag supposed to do?

-Sal.

home help back first fref pref prev next nref lref last post