lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050501091435.GA20036@ucc.gu.uwa.edu.au>
Date: Sun, 1 May 2005 17:14:35 +0800
From: Matt Johnston <matt@....asn.au>
To: bugtraq@...urityfocus.com
Subject: Insecure pty permissions in OS X < 10.4


Hi all.

Mac OS X 10.3.x and earlier doesn't provide any mechanism
for non-setuid-root programs to change permissions on ptys.

Hence xterms, screen sessions, and Terminal.app windows (with
explicitly specified commands) are vulnerable to tty
sniffing. Note that using Terminal.app's standard terminal
with /usr/bin/login is safe since login is setuid root.

An example:

arctic:~> screen
... new screen session starts ...
arctic:~> ls -l $TTY
crw-rw-rw-  1 root  wheel    4,   2  1 May 16:44 /dev/ttyp2

This problem is fixed in 10.4, the devfs appears to be
setting permissions on openpty() or something (I haven't
looked at the mechanism yet). Apple were notified of the
problem on 20 July 2004. 


It's good to see that 10.4 has optional encrypted swap,
resolving the separate issue of passwords being swapped to
disk (fixing it for 3rd party apps as well).

Matt



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ