Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 23 Oct 1995 22:19:14 -0600
From:      Nate Williams <nate@rocky.sri.MT.net>
To:        =?KOI8-R?Q?=E1=CE=C4=D2=C5=CA_=FE=C5=D2=CE=CF=D7?= (aka Andrey A. Chernov, Black Mage) <ache@astral.msk.su>
Cc:        ache@freefall.freebsd.org, freebsd-hackers@freebsd.org
Subject:   Re: ld.so, LD_NOSTD_PATH, and suid/sgid programs
Message-ID:  <199510240419.WAA24802@rocky.sri.MT.net>
In-Reply-To: <PaYN5Zm4G1@ache.dialup.demos.ru>
References:  <m0t7SFB-000078C@seattle.polstra.com> <Aagc1ZmOzJ@ache.dialup.demos.ru> <199510232318.RAA24039@rocky.sri.MT.net> <Faij2Zmq8S@ache.dialup.demos.ru> <199510240010.SAA24195@rocky.sri.MT.net> <Cax53Zm0GT@ache.dialup.demos.ru> <199510240233.UAA24556@rocky.sri.MT.net> <PaYN5Zm4G1@ache.dialup.demos.ru>

next in thread | previous in thread | raw e-mail | index | archive | help
> >Well, simple example:
> 
> >	setuid_shared_binary > /tmp/file
> >	... (f.e. few static commands)
> >	setuid_static_binary < /tmp/file  # OOPS!
> >	(umask is restrictive, of course)

How will this example fail if you set LD_NOSTD_PATH?

> When LD_NOSTD_PATH is set (when it will works, of course),
> first binary fails leaving an empty file and second binary
> got empty input when it isn't suppose it.

And the problem is?

> I assume script was unbreakable, of course, i.e. all signals
> was disabled. Now it becomes breakable.

Why is the script breakable?  

> Basically it means that intruder gains ability to selectively
> control execution flow.

Sigh, I think there are much bigger holes in the system that folks will
have problems with if you attempt to use 'secure' shell scripts.


Nate



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199510240419.WAA24802>