Peter Samuelson writes ("Re: exim-using packages - are you relying on -C or -D 
options?"):
> [Stephen Gran]
> > Currently exim will accept -C to any file in any location.  This
> > makes it trivial for an attacker to escalate from exim to root by
> > making any expansion in the config file run code as a privileged
> > user.  The current alternative is to make exim refuse to execute if
> > the config file is not in a build-time configured directory.
> 
> ...Or just fstat() the file after you open it, to make sure it's owned
> by root:root, and !(mode & 002) ?  I mean, is there a legitimate case
> where this wouldn't be true?

Whenever anyone suggests something like this you can be pretty sure
they're doing it wrong.  This is no exception.

Ownership of a file does not imply endorsement of its contents.  If
you wanted to endorse the contents of a file you would have to put it
in a special location, or perhaps set a set-id bit.

Ian.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/19719.29826.448522.385...@chiark.greenend.org.uk

Reply via email to