Subject: [w00giving '99 #3] UnixWare 7's /var/sadm
w00w00 Security Development (WSD)
---------------------------------------------------------------------------
Discovered by: ktwo (ktwo@ktwo.ca)
When you apply patches to binaries (i.e., for bug fixes), the original,
unpatched binary files (with the suid/sgid bits maintained) are stored
in /var/sadm. By default, the permissions on this directory is 755.
This allows normal users to execute and exploit old binaries leftover
from patching.
---------------------------------------------------------------------------
Patch:
Run 'chmod o-x /var/sadm' to remove execution privileges for normal
users.
---------------------------------------------------------------------------
Contributors to w00giving '99: awr, jobe, Sangfroid, rfp, vacuum,
interrupt, dmess0r, marc, kitekoa, and K2
People who deserve hellos: nocarrier, minus, daveg, nny, dark
spyrit (and beavuh), and w00god blake
Back to w00giving '99
Back to w00w00 webpage