lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: AIX 4.3.3 has make sgid 0? 

On Mon, 22 Mar 2004 15:16:15 GMT, BoneMachine <bonemach@....lonestar.org>  said:
> Hello
> I was browsing the SecurityFocus vulnerability database and found the following:
> http://www.securityfocus.com/bid/9903
> "Because the make utility is reported to run with setGID root privileges, a local attacker may potentially exploit this condition to gain access to the root group"
> 
> Is this true ? I cannot believe that IBM has an setGID root-bit on the make utillity. This goes against all security practices I've ever heard.

Looks like a crock to me.  We still have one AIX 4.3.3 box left around:

[~]1 uname
AIX
[~]1 oslevel
4.3.3.0
[~]1 ls -l /bin/make
lrwxrwxrwx   1 bin      bin           17 Feb 12 2003  /bin/make -> /usr/ccs/bin/make
[~]1 ls -lL /bin/make                                        
-r-xr-xr-x   1 bin      bin        90234 Jul 18 2001  /bin/make
[~]1 lslpp -L bos.adt.base
  Fileset                      Level  State  Description
  ----------------------------------------------------------------------------
  bos.adt.base              4.3.3.77    C    Base Application Development
                                             Toolkit

So if it was ever sgid 0, IBM fixed that sometime before July 2001.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040322/cab591f9/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ