home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.security.misc
- Path: sparky!uunet!caen!zaphod.mps.ohio-state.edu!rpi!fitzgb
- From: fitzgb@mml0.meche.rpi.edu (Brian Fitzgerald)
- Subject: Re: Setuid script - is this unsecure?
- Message-ID: <f7h1cl#@rpi.edu>
- Nntp-Posting-Host: mml0.meche.rpi.edu
- Organization: Rensselaer Polytechnic Institute, Troy, NY
- References: <1d6fdiINNf5q@bnsgd245.bnr.co.uk>
- Date: Thu, 5 Nov 1992 14:59:37 GMT
- Lines: 16
-
- Rick Tait writes:
- >I recently installed these shell scripts on my machine (on which I am root),
- >and I'd like to know if I'm compromising it's security. Basically, they
- >just allow the users to mount/umount/eject the floppy disk (pcfs).
- >
- >#!/bin/sh --
- ..
- >-rwSr-xr-x 1 root staff 368 Oct 11 11:20 in*
- >-rwSr-xr-x 1 root staff 42 Oct 23 15:05 out*
-
- Even though execute permission is denied for root, the link-race attack
- succeeds, so yes, you are potentially giving away root.
-
- There's a faq around that explains, or rtfm execve(2) about #!
-
- Brian
-