18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Appendix B] B.3 SUID and SGID Files<br />

---s--x--x 1 uucp uucp 21304 Jul 15 1994 /usr/bin/uuglist<br />

---s--x--x 1 uucp uucp 17144 Jul 15 1994 /usr/bin/uuname<br />

---s--x--x 1 uucp uucp 60952 Jul 15 1994 /usr/bin/uustat<br />

---s--x--x 1 uucp uucp 68040 Jul 15 1994 /usr/bin/uux<br />

---s--x--x 1 uucp uucp 4816 Jul 15 1994 /usr/lib/uucp/remote.unknown<br />

---s--x--x 1 uucp uucp 169096 Jul 15 1994 /usr/lib/uucp/uucico<br />

---s--x--x 1 uucp uucp 32016 Jul 15 1994 /usr/lib/uucp/uusched<br />

---s--x--x 1 uucp uucp 81040 Jul 15 1994 /usr/lib/uucp/uuxqt<br />

These programs are SUID uucp because they need to access privileged UUCP directories and files.<br />

-r-sr-xr-x 1 root bin 21496 Jul 16 1994 /usr/lib/exrecover<br />

This file is SUID root so that it can access the directory in which editor recovery files are saved. As we have said in other<br />

places in the book, a more secure approach would be to have an account specifically created for accessing this directory, or to<br />

create user-owned subdirectories in a common save directory.<br />

-r-sr-sr-x 1 root tty 151352 Jul 15 1994 /usr/lib/fs/ufs/ufsdump<br />

-r-sr-xr-x 1 root bin 605348 Jul 15 1994 /usr/lib/fs/ufs/ufsrestore<br />

These files are SUID root so that users other than the superuser can make backups. In the Solaris version of these commands,<br />

any user who is in the sys group can dump the contents of the system's disks and restore them without having root access. (As<br />

a result, having sys access on this operating system means that you can effectively read any file on the computer by using a<br />

combination of ufsdump and ufsrestore.) Note: the fact that users in the sys group can dump and undump tapes is not<br />

documented in the man page. Other programs may give undocumented privileges to users who happen to be in particular<br />

groups.<br />

-rwsr-xr-x 1 root adm 4008 Jul 15 1994 /usr/lib/acct/accton<br />

There must be some reason that this program is SUID root. But, once again, we can't figure it out, as the program gives the<br />

error "permission denied" when it is run by anybody other than the superuser.<br />

-rwsr-xr-x 3 root bin 13944 Jul 16 1994 /usr/sbin/allocate<br />

-rwsr-xr-x 3 root bin 13944 Jul 16 1994 /usr/sbin/deallocate<br />

-rwsr-xr-x 3 root bin 13944 Jul 16 1994 /usr/sbin/list_devices<br />

The allocate command allocates devices to users based on the Solaris allocation mechanism. For more information, refer to<br />

the Solaris documentation. We believe that the mkdevalloc and mkdevmaps commands are part of the same system, but they<br />

are not documented.<br />

-rwsr-xr-x 1 root sys 21600 Jul 16 1994 /usr/sbin/sacadm<br />

The sacadm is the top-level entry point into the Service Access Facility system.<br />

-rwsrwxr-x 1 root bin 87808 Jun 24 1994 /usr/openwin/bin/xlock<br />

We think that xlock needs to be SUID root so that it can read your password from the shadow file.<br />

-r-sr-sr-x 1 root sys 20968 Jun 27 1995 /usr/dt/bin/dtaction<br />

-r-sr-xr-x 1 root bin 69172 Jun 27 1995 /usr/dt/bin/dtappgather<br />

-r-sr-xr-x 1 root bin 134600 Jun 27 1995 /usr/dt/bin/dtsession<br />

-r-sr-xr-x 1 root bin 373332 Jun 27 1995 /usr/dt/bin/dtprintinfo<br />

-r-sr-sr-x 1 root daemon 278060 Jun 27 1995 /usr/dt/bin/sdtcm_convert<br />

These programs all appear to perform session management as part of the Common Desktop Environment 1.0. We don't know<br />

why dtaction needs to be SUID root.<br />

B.3.1.2 Undocumented SUID programs<br />

The following programs are SUID and undocumented. This combination is dangerous, because there is no way to tell for sure<br />

what these programs are supposed to do, if they have their SUID/SGID bits properly set, or if they are even part of the<br />

standard operating system release.<br />

---s--x--x 1 root bin 3116 Jul 16 1994 /usr/lib/pt_chmod<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/appb_03.htm (3 of 7) [2002-04-12 10:45:19]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!