Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 10 Aug 2000 17:56:30 -0300
From:      Fred Souza <cseg@kronus.com.br>
To:        "Vladimir Mencl, MK, susSED" <mencl@nenya.ms.mff.cuni.cz>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: suidperl exploit
Message-ID:  <20000810175630.A4754@torment.secfreak.com>
In-Reply-To: Your message of "Thu, Aug 10 2000 19:29:31 %2B0200" <Pine.GSO.4.10.10008101904060.733-100000@nenya.ms.mff.cuni.cz>
References:  <Pine.GSO.4.10.10008101904060.733-100000@nenya.ms.mff.cuni.cz>

next in thread | previous in thread | raw e-mail | index | archive | help
> On FreeBSD, I've not observed the reporting email even after a fair
> amount of time devoted to cause the race-condition.
> 
> 
> Either because I've not succeeded in causing it, or because suidperl
> avoids reporting the issue.
> 
> 
> I've not found any security advisory regarding this - can anybody
> comment on this? Has there be a silent fix to this?

  This is due to the fact that "/bin/mail" is hard-coded in Perl, and FreeBSD
  uses /usr/bin/mail.  The only way for it to work would be creating a link
  /bin/mail -> /usr/bin/mail, which would be extremely pointless and the admin
  who did that should be really hurt. :)

  The other way for it would be someone else creating that link, which would
  imply that the system has already been compromised -- Therefore, why would
  the intruder want to "recompromise" the system using that exploit?  The only
  "reason" I can think of, is to "keep a way back", if he/she gets caught be
  the sysadm.


-- 
"The most difficult thing in the world is to know how to do a thing and
to watch someone else do it wrong without comment."
                -- Theodore H. White


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000810175630.A4754>