On Friday, May 3, 2002, at 05:48 , Tor Hildrum wrote:

> Could someone point me to a page that gives information about all the
> pitfalls that are "available" when running a Perl or CGI script with the
> suid bit set?

there are two important things here

        just because you did the chmod 4755 file
        doesn't mean much until you do the

                chown root:wheel

At which point there is the fun filled and exciting moment
that if you have one of those 'bail to shell' buffer over
flow attack liabilities - then the person on the outside
who has been nailing on your httpd port with their

        Net::Telnet

software - just walked in the front door and took over
your system - and is in the process of using it as a
basis for a distributed denial of service attack, which
may leave you fiscally liable for 'loss of services' and/or
other such 'damages' and 'punishments' as the attorney
with the deeper pockets may be able to secure in the judgement.

As the software developer - you may be able to limit some
of that liability - assuming that your employer considers
it worth their time to not merely set you adrift - as they
work out how to cut their losses and point that you were
simply a disgruntled employee and should be held criminal
negligent....

does that help?

in general - since this is a 'text file' that is being
'interpreted' - it is easier to get the hack in and
'wonk it' with the resident text editor than it is to
'reconfigure' a binary code as the number of people who
can use text editors - once they have hacked A - are
greater than the folks who can do a full on hexdump and
figure out where to do the diff patch to swap the compiled binary
for a more appropriate piece of bliable code.

If you really need setuid processes - then one of the
principle tricks remains to have them 'spawned' from a
nice harder to hack piece of compiled 'c' code.


Your Mileage may vary -
Void Where Prohibited By Law
Do Not bend, fold, spindel or mutilate.

ciao
drieux

---


-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to