lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040209220312.52E0.OZZYBUGT@terra.com.br>
Date: Mon, 09 Feb 2004 22:07:46 -0200
From: Felipe Franciosi <ozzybugt@...ra.com.br>
To: Michal Medvecky <M.Medvecky@...cvut.cz>
Cc: bugtraq@...urityfocus.com
Subject: Re: Samba 3.x + kernel 2.6.x local root vulnerability


This is old news.

NFS is also affected by  this CONFIGURATION PROBLEM (not a bug).  What I
think might be a problem is this:

[...took_from_mount_man...]
OPTIONS
[...]
	nosuid	Do not allow set-user-identifier or set-group-identifier
		bits to take effect.  (This seems safe,  but  is in fact
		rather unsafe if you have suidperl(1) installed.)
[...end_of_cut...]

I have never tried to use suidperl to "exploit" such thing, but my guess
is that suidperl somehow "see" the suid bit and can execute scripts set-
uid-ing the process...  or  maybe  the  man  mount page was just talking
about some old suidperl bug... if someone knows, please tell me.

Best Regards,
Felipe

-- 
Felipe Franciosi <ozzybugt@...ra.com.br>



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ