[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-users] suid perl - 2 month old hazard
- Subject: Re: [cobalt-users] suid perl - 2 month old hazard
- From: Rusty Wilson <rustyw007@xxxxxxxxx>
- Date: Tue Nov 13 21:04:00 2001
- List-id: Mailing list for users to share thoughts on Cobalt products. <cobalt-users.list.cobalt.com>
> I'm now just trying to determine if Neomail set the
> SUID bit on suidperl or was it already there by
> default out of the box..? GSH says it is set by
> default on the RaQ2's -so if anyone has a RaQ3/4
> without Neomail, please check the permissions and let
> us know.
>
> If it is Neomail that's changed things around, then
> everyone who's installed Neomail will be at risk for
> this exploit. If it's set with the SUID bit out of the
> factory/box, then *everyone* is at risk regardless
> (remove those compilers).
>
AAARGH!
I just happen to have 2 identical RaQ4i systems, EXCEPT I have
installed Neomail on one of them.
Guess what...
RaQ *without* neomail --> -rwx--x--x suidperl
RaQ WITH neomail --> -rws--x--x suidperl
Is there some way I can run neomail *AND* be safe from the exploit?
--
Rusty
__________________________________________________
Do You Yahoo!?
Find the one for you at Yahoo! Personals
http://personals.yahoo.com