Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 4 Oct 2000 03:22:39 -0700 (PDT)
From:      Dima Dorfman <dima@unixfreak.org>
To:        "Andrey V. Sokolov" <abc@nns.ru>
Cc:        Dima Dorfman <dima@unixfreak.org>, Kris Kennaway <kris@FreeBSD.ORG>, Alfred Perlstein <bright@wintelcom.net>, Mike Silbersack <silby@silby.com>, security@FreeBSD.ORG
Subject:   Re: BSD chpass (fwd)
Message-ID:  <20001004102239.780551F0D@static.unixfreak.org>
In-Reply-To: <Pine.BSF.4.21.0010041401260.11157-100000@falcon.nns.ru> from "Andrey V. Sokolov" at "Oct 4, 2000 02:10:12 pm"

next in thread | previous in thread | raw e-mail | index | archive | help
> Hi!
> Do not forget! chpass, chfn, chsh, ypchpass, ypchfn, ypchsh are hard
> links! This exploit will work with any command from this set, if
> little modification of exploits code is done.

And since they're hard links, when you [un]set the modes for one, the
others get it to.  In other words, unless you go out of your way to
keep chfn/chsh/etc. setuid to root, chmod 555 `which chpass` is
sufficient.

-- 
Dima Dorfman <dima@unixfreak.org>
Finger dima@unixfreak.org for my public PGP key.

"Reading and writing, arithmetic and grammar do not constitute education, any
more than a knife, fork and spoon constitute a dinner."
        -- John Lubbock


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001004102239.780551F0D>