From owner-freebsd-ports Mon Aug 4 13:59:19 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id NAA27236 for ports-outgoing; Mon, 4 Aug 1997 13:59:19 -0700 (PDT) Received: from onyx.atipa.com (user11521@ns.atipa.com [208.128.22.10]) by hub.freebsd.org (8.8.5/8.8.5) with SMTP id NAA27226 for ; Mon, 4 Aug 1997 13:59:14 -0700 (PDT) Received: (qmail-queue invoked by uid 1018); 4 Aug 1997 21:01:31 -0000 Date: Mon, 4 Aug 1997 15:01:31 -0600 (MDT) From: Atipa X-Sender: freebsd@dot.ishiboo.com To: Marc Slemko cc: "Jonathan A. Zdziarski" , ports@FreeBSD.ORG, security@FreeBSD.ORG Subject: Re: SetUID In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-ports@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Mon, 4 Aug 1997, Marc Slemko wrote: > You could. If you did, however, you would be silly. > > The wrapper you give allows anyone who can run it to do anything they want > as the uid it is setuid to. If you allow the shell script to be modified, yes. Otherwise, I can not see how they could use the wrapper to execute anything but the script hard coded therein. Am I being naive? Set the permissions to 750, chown root. And make sure the shell script is non world or group writable. What's the vulnerablility? Kevin > > > -- cut here (wrapper.c) -- > > > > #include > > main() > > { > > execl("/etc/rc.WHATEVER","WHATEVER",NULL); > > } > > > > -- end--