Subject: Re: [suse-security] SuSE Security Announcement - aaa_base
To: None <tech-security@netbsd.org>
From: Thomas Michael Wanka <tm_wanka@earthling.net>
List: tech-security
Date: 04/29/2000 17:05:44
by mail.netbsd.org with SMTP; 29 Apr 2000 15:04:18 -0000
(InterMail vK.4.02.00.10 201-232-116-110 license 1f48a2e5282ae02b3513b45a0a10fc26)
with ESMTP id <20000429150358.CQVH13685.viemta04@default>
for <tech-security@netbsd.org>; Sat, 29 Apr 2000 17:03:58 +0200
From: "Thomas Michael Wanka" <tm_wanka@earthling.net>
To: tech-security@netbsd.org
Date: Sat, 29 Apr 2000 17:05:44 +0200
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Subject: Re: [suse-security] SuSE Security Announcement - aaa_base
Reply-to: tm_wanka@earthling.net
Message-ID: <390B1668.6351.AAD2E13@localhost>
Priority: normal
In-reply-to: <20000429142806.E601567AD@Galois.suse.de>
Hi,
I include a security information I just got. I have some users homedirs set to
/tmp as they need to be there by default. Am I right that the mentioned
security issue (bash profiles in /tmp) affects my system.
thanks
mike
On 29 Apr 2000, at 16:28, wrote:
> Two vulnerabilities have been found:
>
> 1) The cron job /etc/cron.daily/aaa_base does a daily checking of files
> in
> /tmp and /var/tmp, where old files will be deleted if configured to do
> so.
> Please note this this feature is NOT activated by default
>
> 2) Some system accounts have their homedirectories set to /tmp by
> default.
> These are the users games, firewall, wwwrun and nobody on a SuSE 6.4.
>
> 2. Impact
>
> 1) If the /tmp cleanup is activated, any file or directory can be
> deleted
> by any local user
>
> 2) If an attacker creates dot files in /tmp (e.g. bash profiles),
> these
> might be executed if someone uses e.g. "su - nobody" to switch to the
> nobody user. This can lead to a compromise of that userid.
> This vulnerability is present in several other unix systems as well -
> please check all!
>
> 3. Solution
>
> 1) Update the package from our FTP server.
>
> 2) The root user will receive a email with the accounts listed which
> have
> a homedirectory in /tmp. You have to fix this by hand, because some
> installations might break if they rely on information saved in the
> (unsafe)
> /tmp homedirectory.
> The email will give more information what to do.