setuid shell scripts
Chris Torek
chris at mimsy.UUCP
Tue Nov 22 14:12:57 AEST 1988
In article <5300 at watdcsu.waterloo.edu> dmcanzi at watdcsu.waterloo.edu
(David Canzi) writes:
>Okay, how about this?
>(2) checks that all directories in the path are searchable by
> the invoker, owned only by root or bin, and modifiable only
> by owner.
Since you can check only one path component at a time, this is still
susceptible to spoofing.
(The `access()' syscall has the same problem. The only way to be
*sure* that user 1234 has the permission to do something is to be user
1234 and do the something. setreuid() does the trick, as does a
correct implementation of saved setuid [i.e., not the one in SysV].)
--
In-Real-Life: Chris Torek, Univ of MD Comp Sci Dept (+1 301 454 7163)
Domain: chris at mimsy.umd.edu Path: uunet!mimsy!chris
More information about the Comp.unix.wizards
mailing list