Bugtraq mailing list archives
Re: [Re: Amanda multiple vendor local root compromises]
From: btellier () USA NET (Brock Tellier)
Date: Mon, 1 Nov 1999 18:04:46 MST
vectro () pipeline com wrote:
This is almost true. This exploit can only be performed as the user >amanda is installed under (generally amanda, operator, or bin), because by default the file has the following permissions: $ ls -l /usr/local/libexec/runtar -rwsr-x--- 1 root amanda 46568 Oct 26 00:21 /usr/local/libexec/runtar
If your amanda is properly installed, then it is as a user amanda, bin, >or
operator, none of which should be accessible from a regular user. If >this account is compromised, then security is irrelevant because amanda >need to be able to read the raw disk files (to do backups) and thus would >be able to get /etc/shadow (or the local equivalent) without much work. On my system (FreeBSD 3.3-RELEASE + amanda-2.4.1 package included on CD): -rwsr-xr-x root/wheel And thus ANY user, not just amanda/bin/operator can exploit runtar. Obviously, from the replies I've recieved, this is an error in the package installation, but I assure you that it was entierly automated by /stand/sysinstall and not fooled with by me. "Properly installed" is an interesting phrase. If by "properly" you mean "not mucking around with the default permissions", than I did exactly that. My installation of FreeBSD 3.3-RELEASE was about 3 days old and I had just installed the Amanda-2.4.1 package before starting my testing. Perhaps it is reasonable for everyone to check the permissions of every suid program (I certianly do), but, of course, this doesn't always happen. In any case, I don't *think* this is an installation error on my part and I will try installing again to see if I come up with the same permissions. One interesting point is that some of amanda's other suid programs such as "killprg" and "rundump" have the correct rwsr-x--- root/operator permissions on my system. I would like some Bugtraq subscribers to try and install this package on the same configuration I have and see what they get. Brock Tellier UNIX Systems Administrator Chicago, IL ____________________________________________________________________ Get free email and a permanent address at http://www.netaddress.com/?N=1
Current thread:
- Re: [Re: Amanda multiple vendor local root compromises] Brock Tellier (Nov 01)
- Re: [Re: Amanda multiple vendor local root compromises] Peter Walker (Nov 01)
- Re: [Re: Amanda multiple vendor local root compromises] Robert Watson (Nov 02)
- [debian] New version of nis released Aleph One (Nov 02)
- RFP9907: You, your servers, RDS, and thousands of script kiddies .rain.forest.puppy. (Nov 03)
- UnixWare 7's dtappgather Elias Levy (Nov 03)
- NeoPlanet Saves all emails in Plain text James J. Capone (Nov 03)
- hylafax-4.0.2 local exploit Tellier, Brock (Nov 03)
- IE 5.0 vulnerabilities using HTTP redirection Georgi Guninski (Nov 04)
- <Possible follow-ups>
- Re: [Re: Amanda multiple vendor local root compromises] Alexandre Oliva (Nov 02)
- Re: [Re: Amanda multiple vendor local root compromises] Bruce A. Mah (Nov 02)
(Thread continues...)
- Re: [Re: Amanda multiple vendor local root compromises] Peter Walker (Nov 01)