[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Proposal of new group



On Thu, Oct 14, 1999 at 01:45:29PM +0200, Miquel van Smoorenburg wrote:
> According to Tomasz Wegrzanowski:
> > > But the source might contain a buffer overflow exploit, or another
> > > exploit. Yes, I wrote the code myself, and there is even a comment
> > > in the code about running setuid in a special group. But in my experience
> > > _every_ setuid program has at least one hole, no matter how careful
> > > you are. Avoiding setuid programs (esp. setuid root) is important.
> > 
> > shutdown accepts no user input as far i know so how user can do
> > buffer overflow?
> 
> Well, if you really think that way, you are certainly _not_ the
> person to make something setuid root. Do you follow BugTRAQ? Know
> about l0pth security advisories? CERT? www.rootshell.com ?

Im certainly not a cracker.
 
> Think of command line arguments, environment variables .. that's
> all 'user input'

This (command line arguments, environment variables) is
what i checked in manpages. But theres nothing about
such things (i though about these when i said userinput
such things as additional scripts etc. would be surely
security holes)
 
> > Simple enough suid programs doesnt have always holes.
> 
> 95% of them do, just because they are simple.

I meant these programs which are not useless-features-ful
Such program should exit whenever something is going
not as it though it will be going.


Reply to: