Displaying 20 results from an estimated 300 matches similar to: "Avoiding setuid applications"
1999 Nov 10
0
Re: undocumented bugs - nfsd
On Tue, Nov 09, 1999 at 11:39:39AM +0100, Mariusz Marcinkiewicz wrote:
> After reading lcamtuf's posts I decided write this one. Few months ago one
> of my friends - digit - found bug in linux nfsd daemon. I made example
> sploit about IV 1999. Now in distributions is new nfsd and nowhere was
> information about security weaknes of old version!
Well, one gets used to people
1997 Oct 20
1
LPRng security
Hi all,
I just looked into LPRng to see to what extent it is affected by the
problems recently reported for the BSD lpd. It seems that it is fairly
safe from those mentioned in the SNI advisory.
> Problem 1: File creation
>
> Individuals with access to the line printer daemon from a privileged
> port on a valid print client can tell lpd to create a file, providing
> the name of
1998 Aug 28
0
Linux UNFSD Security Problems
I've got egg on my face... There is a nasty security hole in the
User-space NFS servers. If you are running an NFS server, please
upgrade as soon as possible to the latest release,
nfs-server-2.2beta35.tar.gz, which can be found at
ftp://linux.mathematik.tu-darmstadt.de/pub/linux/people/okir
All previous releases are vulnerable.
<Taking off his okir hat and putting on his caldera
1997 Jul 22
0
ld.so vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
ld.so Vulnerability
A buffer overflow problem was reported on bugtraq affecting the
ELF and a.out program loaders on Linux. This problem can possibly be
exploited by malicious users to obtain root access.
On Linux, programs linked against shared libraries execute some code
contained in /lib/ld.so (for a.out binaries) or /lib/ld-linux.so (for
ELF
1998 Oct 14
0
The poisoned NUL byte
Summary: you can exploit a single-byte buffer overrun to gain root privs.
When, half a day after releasing version 2.2beta37 of the Linux nfs server,
I received a message from Larry Doolittle telling me that it was still
vulnerable to the root exploit posted to bugtraq, I was ready to quit
hacking and start as a carpenter...
Tempting as that was, I didn''t, and started looking for the
1999 Aug 26
2
[RHSA-1999:030-01] Buffer overflow in cron daemon
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow in cron daemon
Advisory ID: RHSA-1999:030-01
Issue date: 1999-08-25
Updated on:
Keywords: vixie-cron crond MAILTO
Cross references:
---------------------------------------------------------------------
1. Topic:
A buffer overflow exists in crond, the cron
1997 Sep 22
1
rwhod is naive
It seems that when you send rwhod an rwho packet, it blindly assumes
you are who the packet says you are. That is to say, it looks as if
any host can inject false rwho data for any other host.
I''m not convinced this is worth fixing. Opinions?
--
- David A. Holland | VINO project home page:
dholland@eecs.harvard.edu | http://www.eecs.harvard.edu/vino
2000 Jul 27
1
rh62 suid files
Hi,
I believe having less root setuid binaries on system is The Way ...
so:
Why does RH6.2 ships with /sbin/dump & /sbin/restore root setuid? These
are for sysadmins, not for regular users I hope.
Is /sbin/unix_chkpwd really used and what is it used for? I haven't find
anything about it in pam documentation.
Is it really necessary to ship /usr/bin/gpasswd and /usr/bin/newgrp? Does
1999 Nov 19
2
[RHSA-1999:055-01] Denial of service attack in syslogd
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Denial of service attack in syslogd
Advisory ID: RHSA-1999:055-01
Issue date: 1999-11-19
Updated on: 1999-11-19
Keywords: syslogd sysklogd stream socket
Cross references: bugtraq id #809
---------------------------------------------------------------------
1. Topic:
A
1998 Mar 09
2
Towards a solution of tmp-file problems.
Introduction.
------------
Every now and then a new "exploit" turns up of some program that uses
tmp files. The first solution was "sticky bits", but since links exist
(that''s a LONG time), that solution is inadequate.
Discussion.
----------
The problem is that you put an object (link/pipe) in the place where
you expect a program to put its tempfile, and wait for
2003 Jan 09
1
[Bug 421] compile error on Debian slink
http://bugzilla.mindrot.org/show_bug.cgi?id=421
------- Additional Comments From carl at chage.com 2003-01-10 05:38 -------
I noticed the same problem with a compile error where ucred is undefined in
SUSE Linux 6.1. The problem is the test for SO_PEERCRED-- the feature is not
available even though the define is present. In my linux/socket.h there is
a "#define SCM_CREDENTIALS" next
1997 Apr 29
9
Yet Another DIP Exploit?
I seem to have stumbled across another vulnerability in DIP. It
appears to allow any user to gain control of arbitrary devices in /dev.
For instance, I have successfully stolen keystrokes from a root login as
follows... (I could also dump characters to the root console)
$ whoami
cesaro
$ cat < /dev/tty1 <------ root login here
bash: /dev/tty1: Permission denied
2018 Aug 22
3
openssh 7.6 and 7.7 on Oracle Linux 7 (compiled from source) doesn't start correctly with systemd
kevin martin wrote:
> not sure why having the systemd notify code in openssh as a
> configure time option would be such a bad thing.
At the very least it introduces a dependency on libsystemd into sshd,
which is undesirable for reasons of security and convenience. The
principle of "you are done when you can not remove any more" confirms
that it is unwise to add dependencies
2007 Nov 16
1
Problem running a setuid Perl script on CentOS 4.5
I'm trying to create a setuid Perl script (yes, I am aware about the
security implications), but am getting this error:
% cat testsetuid.pl
#!/usr/bin/perl -UT
print "My real user id is $< but my effective user id is $>\n";
exit(0);
% ./testsetuid.pl
Can't do setuid (cannot exec sperl)
I am using the stock Perl that came with CentOS 4.5. The problem I
2003 Sep 17
0
FW: opiekey segfault ... isn't that harmfull? it's setuid root
Hi,
I dunno much about exploiting, but I was wondering about the setuid root
program 'opiepasswd' to use one-time-passwords.
When having a seed of (null) and a sequence of -1, I get a segfault.
Kernel/base:
FreeBSD lama.inet-solutions.be 4.8-RELEASE-p4 FreeBSD 4.8-RELEASE-p4 #0:
Sun Aug 31 21:00:38 CEST 2003
root@lama.inet-solutions.be:/usr/obj/usr/src/sys/LAMA i386
Make.conf:
2004 Mar 23
0
samba mount setuid problem
Hi
whenever i try to mount a samba share which is a samba server i get an
error message that says "smbmnt must be installed suid root for direct
mounts(500, 500) smbmnt failed1"
Anybody there who can help please?
i've consulted sambalist and adviced to visit the foolowing site below
http://www.bnro.de/~schmidjo/faq/index.html#faq9
and it says;
login as root and change to
2008 Jun 12
1
[Bug 1310] chmod sftp command and setgid/setuid bit
https://bugzilla.mindrot.org/show_bug.cgi?id=1310
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Blocks| |1452
--- Comment #3 from Damien Miller
2004 Feb 27
1
setuid rsync
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello,
I trying to create an automated backup from one machine to the other via
SSH. I have setup ssh keys and so on, so everything is pretty much
working. The only thing is, I am trying to perserve file ownership. I
don't want to use ssh keys w/o a password (for obvious reasons), so I
what I did was this:
I setup a chrooted account called
2005 Jul 06
1
setuid/setgid bits
version: rsync v2.6.1 (+ a minor, unrelated patch).
I'm rsyncing files (not as root) and am happy (indeed, for what I
want, delighted) that the files at the target side end up owned by the
account doing the rsync.
However, I've found that if I have a setuid/setgid file on the source
side, the target file ends up setuid/setgid too (but under a different
id!). This happens whether
2004 Mar 24
0
Réf. : samba mount setuid problem
When i go to Yast Control center i can see that the user log in is set to
/bin/bash and this is the default.
Is this what you meant?
Where else to find smbmnt? 'coz when i try to open up /usr/bin/smbmnt it tells
me that "COULD NOT FIND THE PROGRAM smbmnt.
rgds,
Segie
On Tuesday 23 March 2004 14:22, you wrote:
> Are you sure that smbmnt is /usr/bin ?
>
>
>