[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: possible security flaw in screen 3.9.5-9



CaT <cat@zip.com.au> writes:

[snip sensible stuff]
> As such I reckon it's best if the screen directory is left in /tmp where
> the authors initially put it. It's inconvenient but doesn't cause the
> problems above.

No indeed, but you have problems with folks who periodically clean out
their /tmp directories, especially based on age of files... choice of two
evils.

Something else I was wondering. The problem was with a setuid version of
screen. I have:

    zsh, potato  2:04PM # ll `which screen`
    -rwxr-sr-x    1 root     utmp       216380 Sep  2 16:52 /usr/bin/screen*
    zsh, potato  2:04PM # 

The impossible question, someone tell me I'm an idiot: is there anything
exploitable through being setgid-utmp? :]

~Tim
-- 
| Geek Code: GCS dpu s-:+ a-- C++++ UBLUAVHSC++++ P+++ L++ E--- W+++(--) N++ 
| w--- O- M-- V-- PS PGP++ t--- X+(-) b D+ G e++(*) h++(*) r--- y-	     
| The sun is melting over the hills,         | http://piglet.is.dreaming.org/
| All our roads are waiting / To be revealed | piglet@glutinous.custard.org



Reply to: