WARNING: SCO-Xenix game "hack", setuid root NO DANGER, OOOOPS
Rick Kelly
rmk at rmkhome.UUCP
Mon Apr 22 05:42:00 AEST 1991
In article <1991Apr18.213843.18297 at odbffm.incom.de> oli at odbffm.incom.de (Oliver Boehmer) writes:
>In <1991Apr17.192850.10450 at odbffm.incom.de> oli at odbffm.incom.de (Oliver Boehmer) writes:
>
>>Hi!
>>When I recently went through the setuid-files on my system, I found, that
>>/usr/games/lib/hackdir/hack (the actual nethack-program) is setuid-root.
>>This version is part of SCO-XENIX Games and was installed with this
>>permissions by the SCO-Utility custom.
>>HACK x4511 root/root 1 ./usr/games/lib/hackdir/hack 01
>>Hack allows shell escapes and I don't have to say what this means.
>
>>If it wouldn't be so serious, I'd laugh about this. But isn't it the right
>>filename for something like that?
>
>>Anyway, it's about time you go through your setuid-files
>> find / \( -perm -4000 -o -perm -6000 \) -print
>
>>oli
>
>Ooooops, I just found out, that the permissions are reset before starting
>the shell, so that there is no potential danger.
>I'm sorry about this.
>But one thing I'd really like to know: Why the &/%$"&/ is hack setuid?
I believe that the high score file belongs to root, and can only be read by
and written to by root.
Rick Kelly rmk at rmkhome.UUCP frog!rmkhome!rmk rmk at frog.UUCP
More information about the Comp.unix.xenix.sco
mailing list