[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#299007: base-files: Insecure PATH



Matt,

>> On my Debian systems, I see:
>> crw-r-----    1 root     kmem       1,   2 Nov 13  2002 kmem
>> with read access only. Does that still give you root ...
> 
> Read-only access to kernel memory should be sufficient to obtain passwords,
> including the root password or the password of a root-equivalent user.

Thanks. (Somewhat cumbersome; but you are right.)

>> NFS-mounted (user) files, mounted writable on several machines; attacker
>> gets root on one machine, creates setgid-staff binary, gets root on all.
>> Is not that realistic?
> 
> Attacker gets root on one machine, creates setuid root binary, gets root on
> all.

Cannot create setuid-root: the filesystem is exported with default
root_squash. Would need to get root on the exporter for that. In my
scenario getting root on any mounter is sufficient.

(I started to think of this, because my boss suggested that we set a
different root password on the exporter, as needing more security than the
various mounters. Most admins would recognize the need to secure the
exporter, but may not realize that root on the mounter also gives it away.)

>> Should not administrators be warned that giving staff privilege is
>> equivalent to root? Are not they being misled into thinking that staff is
>> somehow less dangerous?
> 
> I have already said that I support the removal of these privileges from the
> staff group; we do not disagree on this point.

Yes I noticed your agreement, thanks, and thanks for re-stating it. We seem
to disagree on the urgency only: are there any machines that are currently
affected?

Cheers,

Paul Szabo   psz@maths.usyd.edu.au   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of Sydney    Australia



Reply to: