Date: Wed, 4 Oct 2000 03:22:39 -0700 (PDT) From: Dima Dorfman <dima@unixfreak.org> To: "Andrey V. Sokolov" <abc@nns.ru> Cc: Dima Dorfman <dima@unixfreak.org>, Kris Kennaway <kris@FreeBSD.ORG>, Alfred Perlstein <bright@wintelcom.net>, Mike Silbersack <silby@silby.com>, security@FreeBSD.ORG Subject: Re: BSD chpass (fwd) Message-ID: <20001004102239.780551F0D@static.unixfreak.org> In-Reply-To: <Pine.BSF.4.21.0010041401260.11157-100000@falcon.nns.ru> from "Andrey V. Sokolov" at "Oct 4, 2000 02:10:12 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
> Hi! > Do not forget! chpass, chfn, chsh, ypchpass, ypchfn, ypchsh are hard > links! This exploit will work with any command from this set, if > little modification of exploits code is done. And since they're hard links, when you [un]set the modes for one, the others get it to. In other words, unless you go out of your way to keep chfn/chsh/etc. setuid to root, chmod 555 `which chpass` is sufficient. -- Dima Dorfman <dima@unixfreak.org> Finger dima@unixfreak.org for my public PGP key. "Reading and writing, arithmetic and grammar do not constitute education, any more than a knife, fork and spoon constitute a dinner." -- John Lubbock To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001004102239.780551F0D>