home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!pmafire!mica.inel.gov!ux1!news.byu.edu!hamblin.math.byu.edu!sol.ctr.columbia.edu!zaphod.mps.ohio-state.edu!swrinde!network.ucsd.edu!sdcc12!xm9
- From: xm9@sdcc12.ucsd.edu (richard g. adair)
- Newsgroups: comp.sys.hp
- Subject: Re: root access to nfs filesystems
- Summary: Narsty NFS hole
- Keywords: nfs root
- Message-ID: <41186@sdcc12.ucsd.edu>
- Date: 18 Nov 92 15:47:57 GMT
- References: <1992Nov16.234717.18547@nosc.mil> <1992Nov17.170956.29695@lmpsbbs.comm.mot.com> <1ebneeINN2k4@trwvssi.vssi.trw.com>
- Sender: news@sdcc12.ucsd.edu
- Organization: Arete Associates, San Diego
- Lines: 12
- Nntp-Posting-Host: sdcc12.ucsd.edu
-
- In article <1ebneeINN2k4@trwvssi.vssi.trw.com> b_kondalski@vssi.trw.com (Brian J. Kondalski) writes:
- >In article <1992Nov17.170956.29695@lmpsbbs.comm.mot.com> bennett@areaplg2.corp.mot.com writes:
- >My pcnfs users have a userid when they mount via nfs from my 750. If they
- >don't have permission to modify a file, then they can't. And I have patched
- >my kernel to allow root export. Where does this security hole come in?
-
- Have the user log in as root and fail the password. Then, have the
- user delete all the files on every machine on your network. Fun!
-
- Tony Burzio
- Arete Associates
- San Diego, CA
-