home *** CD-ROM | disk | FTP | other *** search
- From: Stephen Usher <steve@earth.ox.ac.uk>
- Subject: Re: seduid scripts
- Date: Tue, 23 Mar 93 7:59:52 BST
- In-Reply-To: <9303230506.AA22931@netcom4.netcom.com>; from "Eric R. Smith" at Mar 22, 93 9:06 pm
-
- >How about a (setuid root) program that acts as a setuid server; i.e.
- >whenever exec detects a #! as the first two characters of a file,
- >it instead execs /bin/scripter (or whatever we want to call it) with
- >the script file name as the first argument and the other parameters
- >(if any) following it. /bin/scripter then checks the uid, gid, and
- >permission bits, does appropriate setuid() and setgid() calls, and
- >executes the interpreter (after performing any /->\ translations
- >that are necessary).
- >
- >Obviously if the script is *not* setuid or setgid then exec can
- >bypass /bin/scripter and just do the script directly.
-
- This sounds an even more unholy mess than one incidence of / -> \ conversion
- in the kernel! Anyway, it's just one more security hole, not that there
- aren't one or two already! :-)
-
- Steve
-
- --
- ---------------------------------------------------------------------------
- Computer Systems Administrator, Dept. of Earth Sciences, Oxford University.
- E-Mail: steve@uk.ac.ox.earth (JANET) steve@earth.ox.ac.uk (Internet).
- Tel:- Oxford (0865) 282110 (UK) or +44 865 282110 (International).
-