WARNING: SCO-Xenix game "hack", setuid root NO DANGER, OOOOPS
Oliver Boehmer
oli at odbffm.incom.de
Fri Apr 19 07:38:43 AEST 1991
In <1991Apr17.192850.10450 at odbffm.incom.de> oli at odbffm.incom.de (Oliver Boehmer) writes:
>Hi!
>When I recently went through the setuid-files on my system, I found, that
>/usr/games/lib/hackdir/hack (the actual nethack-program) is setuid-root.
>This version is part of SCO-XENIX Games and was installed with this
>permissions by the SCO-Utility custom.
>HACK x4511 root/root 1 ./usr/games/lib/hackdir/hack 01
>Hack allows shell escapes and I don't have to say what this means.
>If it wouldn't be so serious, I'd laugh about this. But isn't it the right
>filename for something like that?
>Anyway, it's about time you go through your setuid-files
> find / \( -perm -4000 -o -perm -6000 \) -print
>oli
Ooooops, I just found out, that the permissions are reset before starting
the shell, so that there is no potential danger.
I'm sorry about this.
But one thing I'd really like to know: Why the &/%$"&/ is hack setuid?
Oh well.
oli
--
Oliver Boehmer, Frankfurt, Germany oli at odbffm.incom.de
+49-69-331461 (voice) +49-60-308265 (1200/2400)
If God is perfect, why did He create discontinuous functions?
More information about the Comp.unix.admin
mailing list