On 08/27/2010 10:32 AM, Vadim Goncharov wrote:

This is a froward message from tcpdump-workers mail list:
=== 8<  ================>8 ===
$ sudo ./tcpdump -i any -G 1 -z ./test.sh -w dump port 55555
[sudo] password for user:
tcpdump: listening on any, link-type LINUX_SLL (Linux cooked), capture size
65535 bytes
(generate some traffic on port 55555)
r...@blaa ~/temp/tcpdump-4.1.1$ id
uid=0(root) gid=0(root) groups=0(root)

Is this known and accepted? Could this option maybe be implemented
differently?

In my opinion, if you allow people to run tools as root using sudo, you'd better make sure those tools don't allow attackers to easily gain root access. In the case of tcpdump, the '-w' flag most probably already allowed that, although '-z' is a bit more convenient to the attacker.

As a solution, configure your sudo correctly, only allowing specific tcpdump command line options (or option sets) to be used.

--
Pieter

_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "[email protected]"

Reply via email to