home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!vtserf!black-ice.cc.vt.edu!valdis
- From: valdis@black-ice.cc.vt.edu (Valdis Kletnieks)
- Newsgroups: comp.security.misc
- Subject: Re: Setuid file
- Message-ID: <9449@vtserf.cc.vt.edu>
- Date: 12 Nov 92 02:54:57 GMT
- References: <1d9ggiINNsfb@sequoia.ccsd.uts.EDU.AU> <1992Nov9.183358.12335@nas.nasa.gov> <1992Nov10.151709.5734@pool.info.sunyit.edu>
- Sender: news@vtserf.cc.vt.edu
- Organization: Virginia Tech, Blacksburg, VA
- Lines: 14
-
- In article <1992Nov10.151709.5734@pool.info.sunyit.edu> buck@pool.info.sunyit.edu (Jesse Buckley) writes:
- >In article <1992Nov9.183358.12335@nas.nasa.gov> jns@ace.nas.nasa.gov (John N. Stewart) writes:
- >>There is a simple logic -- anything that is setuid has a potential --
- >>it's intuitive. Sure, an empty file may not seem bad -- but there are
- >>potential risks.
- >
- >Like a "hideing" place for suid stuff.
-
- Of course, once you put something in it, the file isn't empty.
-
- I wonder if there's any creative applications for a mode
- 4755 /dev/null?
-
- /Valdis
-