[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-users] suid perl - 2 month old hazard



On Tue, 13 Nov 2001, Barbara - wrote:

> >For this exploit to work, you need 
> >to have /usr/bin/suidperl setuid.  
> >We do not ship suidperl setuid.  We do 
> >ship the binary, but purposely removed 
> >the suid bit on the program because it 
> >was not needed.  This exploit will not 
> >work unless you have changed permissions 
> >on the suidperl binary.
> 
> Okay now, correct me if I'm wrong, but on my RaQ's,
> SUID **IS** set on this file by default:
> 
> -rws--x--x  2 root  root 517916  Apr  6  1999 suidperl
> 
> It was my understanding that any file with the 's' in
> the permission mode of the binary (-rws--x--x) is
> built with the SUID bit set to *ON* -and- usually

Yup

And i hate to add this, but the Raq2 with factory software has suid bits
set also :(

-rws--x--x   2 root     root       868404 Oct 20  1998 /usr/bin/suidperl

This is perl, version 5.004_04 built for mips-linux

md5sum /usr/bin/suidperl 
525d33b9690cd958ddc39075f5d997ca

Note that up to and including 5.00403 are vulnerable...:(

I don't *think* there ever was an update for this...

gsh