home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.security.misc
- Path: sparky!uunet!haven.umd.edu!ames!news.hawaii.edu!wiliki.eng.hawaii.edu!newsham
- From: newsham@wiliki.eng.hawaii.edu (Timothy Newsham)
- Subject: Re: Setuid file
- Message-ID: <1992Nov7.203923.522@news.Hawaii.Edu>
- Summary: Expires:
- Sender: root@news.Hawaii.Edu (News Service)
- Nntp-Posting-Host: wiliki.eng.hawaii.edu
- Organization: University of Engineering, College of Engineering
- References: <chupchup.720790116@piggy> <1d9ggiINNsfb@sequoia.ccsd.uts.EDU.AU> <1992Nov5.090120.14723@lut.ac.uk>
- Date: Sat, 7 Nov 1992 20:39:23 GMT
- Lines: 21
-
- >>Robert Earl (chupchup@ferkel.ucsb.edu) wrote:
- >>:
- >>: | Found this on one of our systems. Anyone know if there is any way
- >>: | this could be used to obtain root access?
- >>: | -rwsr-xr-x 1 root 0 Apr 7 1992 file
- >>:
- >
- >Still, if you don't know what it is, back it up and then delete it.
- >Better safe than sorry.
- >
- >Jon
-
- I just made an empty file with +x perms and typed in its
- name at the shell prompt. It apparently tried to execute it
- and for some reason sourced my .cshrc. This is on an older
- HPUX system. I didnt however set it suid since I am a non-priveledged
- user so I cant tell you if it would work as suid. (I think i
- remember that hpux wouldnt run shell scripts with out the '#!' in
- them as suid, maybe just a local patch?)
-
-
-