Bugtraq mailing list archives
Re: Security Info (root broken)
From: pug () arlut utexas edu (Pug)
Date: Thu, 29 Sep 1994 17:39:26 -0600 (CDT)
I see allowing 'r' commands into your installation as a Bad Thing anyway.I agree that removing the .rhosts ability is a good idea, but it would be just as easy for an intruder to use the race condition to overwrite the password file with their own root account unless this particular bug doesnt allow overwriting files.
When I tested the program, it did not allow the overwritting of any existing file. I have to admit that I never tried to append to a file though.
Or they could create a .forward file to gain the root's permissions. I am sure there are other methods to subvert the machine, if allowed to write root owned files.
That is something else we have disabled. Yes, it makes things like procmail and the like annoying, but better safe than sorry. Ciao, -- Richard Bainter Mundanely | System Analyst - OMG/CSD Pug Generally | Applied Research Labs - U.Texas pug () arlut utexas edu | pug () bga com Note: The views may not reflect my employers, or even my own for that matter.
Current thread:
- Re: Security Info (root broken), (continued)
- Re: Security Info (root broken) Charles R. Hoynowski (Sep 29)
- Re: Security Info (root broken) Christopher Klaus (Sep 28)
- Re: Security Info (root broken) Pug (Sep 29)
- Re: Security Info (root broken) John Ladwig (Sep 29)
- Re: Security Info (root broken) Pug (Sep 29)
- Re: Security Info (root broken) Casper Dik (Sep 29)
- Re: Security Info (root broken) Timothy Newsham (Sep 29)
- Old sendmail bugs Michael Neuman (Sep 29)
- Re: Security Info (root broken) Karl Strickland (Sep 29)
- Re: Security Info (root broken) Christopher Klaus (Sep 29)
- Re: Security Info (root broken) Pug (Sep 29)
- Re: Security Info (root broken) Pug (Sep 29)
- Re: Security Info (root broken) Neil Woods (Sep 29)
- IBM AIX rlogin fix jim () Tadpole COM (Sep 28)
- security problem w/ smail james w abendschan (Sep 27)