[Eug-lug] local root exploit via setuid

Ben Barrett benb at nu-world.com
Thu Apr 29 15:53:31 PDT 2004


Check these out, and see if you are left with any more-specific questions:

http://www.securityfocus.com/advisories/6599

http://www.securityfocus.com/advisories/6584

http://www.securityfocus.com/advisories/6513

http://www.securityfocus.com/advisories/6450

This older vuln-dev message pertains also.  The author, Cripin Cowan, works up near
Portland and is part of the C.R.I.M.E. group up there:

http://www.securityfocus.com/archive/82/163951

The gist of it is that many programs must have some amount of root-level
capabilities to function properly, which can allow for an exploit involving said
program to allow the user to become root, by the same means that the program takes
root privileges... shouldn't happen, but it can.

This is only a real problem on a shared-but-inaccessible system.  If you are the
only user, or if every user has physical access to the machine, then it is sort of
a moot point, since it is trivial to boot knoppix or similar and reset the root
password, or do anything on that system (as root or otherwise).

It matters most for things like a simple pop-mail server.  All too many are setup
so that pop users can actually login, which is usually not desirable for exactly
these reasons -- *and* especially a concern in that situation, since pop passwords
are usually flying around the 'net in plaintext, where they can be grabbed and
tested for shell login on the host... if someone bad found that, then you'd have an
intruder looking for their setuid exploit, to root the mailserver.  (as an example)

Hope this helps,

    Ben




On Thu, 29 Apr 2004 14:20:31 -0700
Rob Hudson <rob at euglug.net> wrote:

| I see some security warnings about local users can gain root via a
| setuid exploit...
| 
|     There is a bug in [package] which may allow local users to gain root
|     via a setuid file...
| 
| How does this work?


More information about the EUGLUG mailing list