home *** CD-ROM | disk | FTP | other *** search
-
- There is a security hole in Red Hat 2.1, which installs /usr/bin/mh/inc
- and /usr/bin/mh/msgchk suid root. These programs are configured suid root
- in order to bind to a privileged port for rpop authentication. However,
- there is a non-security conflict between mh and the default Red Hat 2.1
- configuration in that the /etc/services lists pop-2 and pop-3 services, but
- the mh utilities do lookups for a pop service, which doesn't exist, resulting
- in an inability to use any of the pop functionality. This may be a fortunate
- bug, since there may be more serious security holes within the pop functions
- of these two program.
- The security hole present in these two programs is that when opening
- up the configuration files in the user's home directory, root privileges
- are maintained, and symbolic links are followed. This allows an arbitrary
- file to to be opened. Fortunately, the program does not simply dump the
- contents of this file anywhere, and only certain formatting is allowed in
- the file to be processed by the program in order to see any output. In
- the cases where it will be processed, only the first line of the file will
- actually be output to the user.
-
- Program: /usr/bin/mh/inc, /usr/bin/mh/msgchk
- Affected Operating Systems: RedHat 2.1 linux distribution
- Requirements: account on system
- Patch: chmod -s /usr/bin/mh/inc /usr/bin/mh/msgchk
- Security Compromise: read 1st line of some arbitrary files
- Author: Dave M. (davem@cmu.edu)
- Synopsis: inc & msgchk fail to check file permissions
- before opening user configuration files
- in the user's home directory, allowing a user
- on the system to read the first line of any
- file on the system with some limitations.
-
- Exploit:
- $ ln -s FILE_TO_READ ~/.mh_profile
- $ /usr/bin/mh/msgchk
-
-
-
-
-
-