[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-security] [SECURITY WARNING] All Neomail users
- Subject: Re: [cobalt-security] [SECURITY WARNING] All Neomail users
- From: "Taco Scargo" <taco.scargo@xxxxxxx>
- Date: Mon, 19 Nov 2001 08:35:46 +0100
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
Being SUID root is not the issue here. Being vulnerable AND being SUID root
is. Therefore I replaced the permissions on suidperl with the ones as the
RaQ/Qube was delivered to you and added two SUID wrapper programs that will
run without any securityproblems.
With regards,
Taco Scargo
Professional Services Manager, EMEA
Sun Microsystems Tel. +31 (71) 565 7021
Sun Cobalt Server Appliances taco.scargo@xxxxxxx
-
----- Original Message -----
From: "Michael Stauber" <cobalt@xxxxxxxxxxxxxx>
To: <cobalt-security@xxxxxxxxxxxxxxx>
Sent: Saturday, November 17, 2001 12:35 PM
Subject: Re: [cobalt-security] [SECURITY WARNING] All Neomail users
> > Search on SUID in the archives, you evidently missed the discussion.
>
> I think that is somewhat besides the point. I just wonder why
"unsupported"
> and "unofficial" software does an elementary change to the system without
> telling beforehand that it actually does so.
>
> Just run the following from the command line as root:
>
> find / \( -perm +4000 -o -perm +2000 \) -type f -exec ls -l {} \;
>
> It will still turn up plenty of files which are SUID root.
>
> --
>
> With best regards,
>
> Michael Stauber
>
> _______________________________________________
> cobalt-security mailing list
> cobalt-security@xxxxxxxxxxxxxxx
> http://list.cobalt.com/mailman/listinfo/cobalt-security
>