Michael Stone wrote:
> Generally it means that someone just learned something that people
> already knew about.

I've never heard of this class of vulnerabilities, but I perhaps that
just makes me a clueless security noob.

Anyway, it was pointed out in a reply to the gzip bug that this kind of
hole also facilitates social engineering attacks of the form "Could you
please try to gunzip this file I have in my home directory, it doesn't
seem to work?". Or "Hey Mr. alioth admin, /svn/d-i/locks went missing;
some d-i people are screaming at me that they can't commit, and I can't
log in because don't have my ssh key here. You just need to mkdir -m 2775
/svn/d-i/locks, please save me!"

Personally I think that not making root need to audit simple unix tools
of this type before being able to safely follow up on a user's request
makes this class of holes worth fixing, in at least that set of tools,
even if it's too widespread to fix everywhere.

> Not quite. You can set the desired mode in the mkdir call, but you have
> to alter the existing umask to make it less restrictive. You can't add
> suid or sgid bits that way.

Good point.

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to