Hola,

On Mon, Nov 15, 1999 at 12:23:26PM +0000, Ricard Sierra wrote:
>   A mi se me ocurre utilizar super y un script donde descargues los modulos 
> del
> ppp y llames al programa de captura de la camara. A parte puedes indicar los
> usuarios que tienen derecho a ejecutar el comando. La verdad es que super va 
> muy
> bien para cosas como esta (montar el cdrom, hacer un halt, reboot, etc.. sin
> tener que entrar como root).

A prop�sito de super, s� que mucha gente usa 'sudo' para hacer esto mismo.
Yo tambi�n prefiero super, pero al grano. En la lista de seguridad unix de
kript�polis ha llegado lo siguiente, supongo que es bueno compartirlo:


---------- Forwarded message ----------
Date: Thu, 11 Nov 1999 21:38:21 -0600 (CST)
From: Wade Maxfield <[EMAIL PROTECTED]>
To: [email protected]
Subject: [linux-security] security hole in sudo allows users full access
Resent-Date: 12 Nov 1999 08:04:16 -0000
Resent-From: [email protected]
Resent-cc: recipient list not shown: ;


  While sudo is used to give fairly trusted users the ability to run
programs with root privs, there exists a hole in the one in the RedHat
contrib directory (sudo 1.5.9.p4) which allows a minimally trusted user to
obtain full root access and privilege.

  If a user is given the opportunity to run any program, that user can
fool sudo and obtain any level of privilege for any executable.

  Assume the user can run "/bin/treport" as listed in the sudoers file.
(The actual program name does not matter.)

  the user copies /bin/vi to ./treport (assuming the user is in a
directory in which he has write and execute priv.) the user then executes
the following line:

sudo ./treport /etc/shadow

  vi is executed with root privilege and shadow is opened. The full path
of treport is not required.  The correct path of treport is not required.

  This program should be restricted only to _very_ trusted users in the
meantime.


wade

[mod: Note that many operations that normally require "root" will
"give away" root when allowed under "sudo" with a little puzzeling.
This, however, is unforgivable..... -- REW]

--------------------------------------------------------------------

Para quien no entienda ingl�s, un bug en sudo permite enga�arle ya que no
comprueba el path del ejecutable, as� que si tienes permiso en sudoers para
ejecutar "foo", haces "cp /bin/vi ~/foo" "y luego "./foo /etc/shadow" y ale,
editando como root. No lo he comprobado, si alguien usa sudo, que lo haga y
comente.
En fin, el mensaje es alto y claro: No le des sudo a nadie del que no
conf�es plenamente.

Salut,

Jordi

Attachment: pgp5tLNRiuJqi.pgp
Description: PGP signature

Responder a