Setuid

Differences between revisions 10 and 11
Revision 10 as of 2007-10-31 21:50:34
Size: 1217
Editor: office4
Comment: Adding cdrtools and the location where each app drops privs
Revision 11 as of 2007-10-31 21:57:02
Size: 1365
Editor: office4
Comment: Added check-foreground-console
Deletions are marked like this. Additions are marked like this.
Line 10: Line 10:
|| libpam-foreground || /bin/check-foreground-console || no || no || n/a || Tiny wrapper to read /dev/console. No real security gain to deroot. ||

This is a list of setuid applications that need investigation. See the [https://lists.ubuntu.com/archives/ubuntu-hardened/2007-October/000217.html mailinglist post] about this for more information.

Source Package Name

setuid Files

De-rooted

Capabilities

Changes Sent Upstream

Comments

iputils

/bin/ping, /bin/ping6, /bin/arping, /usr/bin/traceroute6.iputils

yes

possible

UNKNOWN

*line 129 ping.c, *line 217 ping6.c, *line 314 arping.c, *line 343 traceroute6.c

fping

/bin/fping

needed

no

Checks: if ( geteuid() ) {... exit(3); Will patch and send upstream -JeffSchroeder

mtr

/usr/bin/mtr

yes

possible

n/a

*line 333 in mtr.c

util-linux

/bin/mount, /bin/umount

needed

no

n/a

Checks: if (getuid () != geteuid ()). Should check for CAP_SYS_ADMIN capability

glibc

/usr/lib/pt_chown

yes

possible

n/a

*line 147 in glibc-2.6.1/login/programs/pt_chown.c

cdrtools

/usr/bin/cdrecord

yes

possible

n/a

*line 1120 in cdrecord/cdrecord.c

libpam-foreground

/bin/check-foreground-console

no

no

n/a

Tiny wrapper to read /dev/console. No real security gain to deroot.

* - Where in the software the privileges are dropped using the setuid() or setreuid() system calls.

Security/Investigation/Setuid (last edited 2013-07-23 07:07:01 by 74)