Oliver Fromme wrote:

Argelo, Jorn <[EMAIL PROTECTED]> wrote:
> [...]
> This site, of course (almost) completely in Russian, had a file to gain > root access with a modified su utility. [...] > > This is a translation from babelfish: > > Plain replacement of "standard" su for FreeBSD. It makes it possible to > become any user (inc. root) with the introduction of any password. For > this necessary to neglect su with the option "-!". with the use of this > option does not conduct ravine- files. Was tested on FreeBSD 5.4-STABLE.

To install such a modified su utility, you need to be root
anyway.

So this is not an exploit.  It could be useful to install
hidden backdoors on cracked machines, though, as part of a
root kit or similar.  You could achieve the same effect by
copying /bin/sh to some hidden place and make it setuid-
root (which also requires root priviledges in the first
place).  The advantage of a modified su utility is the fact
that su(1) is setuid-root anyway, so it might be more
difficult to detect the backdoor.

However -- In both cases the modified suid binary should
be found and reported by the nightly security cronjob,
unless you also modify find(1) and/or other utilities.
This is a very good reason to actually _read_ the nightly
cron output instead of deleting it immediately or forwar-
ding it to /dev/null.  ;-)

(Also, local IDS tools like tripwire or mtree might be
useful for such cases, too.)

Best regards
  Oliver

Thank you for clearing this up Oliver. I just wanted to make sure it's a harmless thing. Better safe then sorry ;)

Cheers,

Jorn.
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to