Mark wrote:

> 2): Why is it believed that such a trick will automagically allow an
> attacker to execute a self-made program with elevated privileges, like
> root?

It's commonly assumed that most UNIX systems have locally-exploitable bugs
that permit local users to gain root access.  While this is not necessarily
true, it is safest to assume that an attacker who manages to get a local
shell will eventally get elevated or even root access.

> Also, where does the idea come from that a symlink will magically bring
> the attacker root access? If .progname.day-of-month were a symlink, then
> please, anyone, show me to what sort of file this symlink could point to
> that would suddenly allow the attacker to gain root-access?

Well, for example, it could point to the ClamAV user's .bashrc file
and cleverly manipulating the contents of this file might permit the
user to run something as the ClamAV user if the sysadmin makes a
careless mistake.  Yes, it's tricky.  No, it's not science-fiction:
Attacks like these do happen in the real world.

> Also, on FreeBSD, we set /tmp +t, which means items in /tmp can be renamed
> or deleted only by the item's owner.

Most modern UNIX systems do that.

> In short, I fail to see what the fuss is all about. O_EXCL should have
> been there, but it's a minor bug -- especially since the TS initially
> failed to realize there was randomness, after all (though it could be
> improved upon). I see no realistic possibilities for exploits. But I'm of
> course open to hearing how someone thinks a realistic attack could be
> mounted with it.

The problem is that even seemingly far-fetched vulnerabilities have a nasty
history of being exploited in the real-world.  You'd be surprised at
the creativity of attackers.

Regards,

David.
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to