[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-security] [SECURITY WARNING] All Neomail users



Being SUID root is not the issue here. Being vulnerable AND being SUID root
is. Therefore I replaced the permissions on suidperl with the ones as the
RaQ/Qube was delivered to you and added two SUID wrapper programs that will
run without any securityproblems.

With regards,

Taco Scargo

Professional Services Manager, EMEA

Sun Microsystems   Tel.  +31 (71) 565 7021
Sun Cobalt Server Appliances  taco.scargo@xxxxxxx
-
----- Original Message -----
From: "Michael Stauber" <cobalt@xxxxxxxxxxxxxx>
To: <cobalt-security@xxxxxxxxxxxxxxx>
Sent: Saturday, November 17, 2001 12:35 PM
Subject: Re: [cobalt-security] [SECURITY WARNING] All Neomail users


> > Search on SUID in the archives, you evidently missed the discussion.
>
> I think that is somewhat besides the point. I just wonder why
"unsupported"
> and "unofficial" software does an elementary change to the system without
> telling beforehand that it actually does so.
>
> Just run the following from the command line as root:
>
> find / \( -perm +4000 -o -perm +2000 \) -type f -exec ls -l {} \;
>
> It will still turn up plenty of files which are SUID root.
>
> --
>
> With best regards,
>
> Michael Stauber
>
> _______________________________________________
> cobalt-security mailing list
> cobalt-security@xxxxxxxxxxxxxxx
> http://list.cobalt.com/mailman/listinfo/cobalt-security
>