[plug] Possible (???) security hole in Debian 2.0

Lindsay Allen allen at cleo.murdoch.edu.au
Fri Sep 4 08:54:20 WST 1998


Not a problem.

Any user can run the script, just as he can type in the same command and
try to run it.  But the scripts are not suid and so do not run with root
permissions.

For example:

elm# ps axc|grep lpd
 3228  ?  S    0:00 lpd

now I try to stop lpd

elm$ /sbin/start-stop-daemon --stop --quiet --pidfile /var/run/lpd.pid
--exec /usr/sbin/lpd

but it is still running.

elm# ps axc|grep lpd
 3228  ?  S    0:00 lpd


Lindsay
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Lindsay Allen   <allen at cleo.murdoch.edu.au>  Perth, Western Australia
voice +61 8 9316 2486    32.0125S 115.8445E    vk6lj      Debian Linux
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

On Fri, 4 Sep 1998, David Campbell wrote:

> I don't know if this is a problem that has been reported or not but....
> 
> I just found that all the scripts in /etc/init.d/ had rwxr-xr-x permisions. This 
> means that anyone logged in could start/stop daemons on the machine. I 
> personally do not find this a good idea.
> 
> Could other people running Debian 2.0 please check their /etc/init.d/ 
> directory and let me know if it is a problem with only my machine or it affects 
> others.
> 
> Appologies if this has been noted before but I don't remember seeing 
> anything on this mailing list before.
> 
> David Campbell (paranoid)
> 
> =======================================================
> campbell at torque.net
> 
> "There is no such thing as a bug in the Linux 2.1.x kernels
> Consider it as a request from the enlightened for you to brush
> up on your C programming and help improve the kernel."
> 



More information about the plug mailing list