Casinos Not On GamstopNon Gamstop CasinosCasinos Not On GamstopOnline Casinos UKNon Gamstop Casino
4th Apr 1998 [SBWID-70]
COMMAND
	    coredumps
SYSTEMS AFFECTED
	    BSD/OS 2.x
PROBLEM
	    Denis Papp posted  following.  Patch  K210-029 may lead  people to
	    have  wrong  opinion.   Quote:  "This  patch  addresses a security
	    problem with core dumps from setuid programs."
	    Apparently this  patch does  not fix  the problem  where coredumps
	    follow symlinks.   If a  user knows  how to  core dump  any setuid
	    root program  that user  can then  clobber any  file on the system
	    (/root/.rhosts,    /etc/passwd,    /etc/hosts.equiv,    whatever).
	    Furthermore  if  that  user  knows  how  to  clobber a setuid root
	    program that calls getpass* then the user can get all the shadowed
	    passwords (not quite all (depending  on the size of your  password
	    file), but certainly some).
	    This is easy to verify by  creating a simple setuid root app  that
	    core  dumps  and  then  making  a  symbolic  link from app.core to
	    /root/.rhosts.   If  your  system  accepts  '+  +' anywhere in the
	    .rhosts file you can put that in your env to get root access.
SOLUTION
	    There  is  a  later  patch  for  BSD/OS  3.0  (M300-023)  which is
	    described as:
	
	        Fixes  a  potential  denial  of  service attack related to the
	        kernel following symbolic links when writing core files.
	
	    which should fix the problem once and for all. The initial release
	    of 3.0 attempted to fix  the problem differently and failed.   The
	    M300-023 patch,  doesn't disable  SUID core  dumps altogether  but
	    does  prevent  them   from  following  symlinks.    Unfortunately,
	    upgrading to 3.0 requires you to pay BSDI.
	

Internet highlights