Bugtraq mailing list archives
RE: Sudo tricks
From: "Burton Strauss" <Security () SmallNetSolutions com>
Date: Wed, 29 Mar 2006 11:46:42 -0600
Isn't the real meat of this issue the commands an unprivileged user is permitted to execute via sudo? Sudo isn't a blanket 'execute anything' unless it's set up that way. Instead, you should carefully choose the specific command(s) that the user needs to be allowed to execute. That should involve execution from an absolute path and a protected binary. For example, if visudo contains this /sbin/ifconfig eth0 Then all the user can execute is the ifconfig command from the protected binary in /sbin/ifconfig to see the state of the interface. Or this /sbin/ifconfig eth0 * Allows him/her full control of eth0 - but still from the protected binary in /sbin/ifconfig. If you specify this: ifconfig eth0 * Then all bets are off... -----Burton
Current thread:
- Sudo tricks John Richard Moser (Mar 23)
- Re: Sudo tricks Dave Korn (Mar 25)
- Re: Sudo tricks Kyle Wheeler (Mar 27)
- Re: Sudo tricks Thomas M. Payerle (Mar 28)
- Re: Sudo tricks Krzysztof Halasa (Mar 29)
- RE: Sudo tricks Burton Strauss (Mar 31)
- <Possible follow-ups>
- Re: Sudo tricks Steven M. Christey (Mar 28)
- Re: Sudo tricks Javor Ninov (Mar 31)
- Re: Sudo tricks Dave Korn (Mar 25)