Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Dec 2001 11:57:55 +1100
From:      "Tim J. Robbins" <tim@robbins.dropbear.id.au>
To:        Ruslan Ermilov <ru@FreeBSD.ORG>
Cc:        security@FreeBSD.ORG, bug-followup@FreeBSD.ORG
Subject:   Re: bin/32791: FreeBSD's man(1) utility vulnerable to old catman attacks
Message-ID:  <20011214115755.A9872@raven.robbins.dropbear.id.au>
In-Reply-To: <20011213153804.A19995@sunbay.com>; from ru@FreeBSD.ORG on Thu, Dec 13, 2001 at 03:38:04PM %2B0200
References:  <200112130713.fBD7DiH01449@raven.robbins.dropbear.id.au> <20011213153804.A19995@sunbay.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Dec 13, 2001 at 03:38:04PM +0200, Ruslan Ermilov wrote:

> Unfortunately, removing SUID bit from man(1) is not possible,
> because it is used to create new or update obsolete catpages
> in %manpath%/cat%section% directories which are usually owned
> by the user ``man'', except private user directories.

I think that making man sgid man instead of suid man would be a good
idea also; I remember Red Hat Linux used this same man utility in version 6.2
and they had it sgid. If an attacker gained uid man through a flaw in the
utility, they could plant a trojan horse and wait for root to run it.

I'll check out how it's been done in Redhat and see if I can come up
with a patch. I don't think this would break anything.

As for the catman issues, I think it's a flaw in the man utility that
it trusts the user running the command to format the manual pages.
I can't think of a good way to fix it.


Tim

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011214115755.A9872>