Brian Morrison wrote:
> Dennis Peterson wrote:
>   
>>> Yes, I realise that. I run clamd under user clamav, hence it's probably 
>>> easier to access /var/lib/clamav/* than it would be if owned by root.
>>>       
>> Why would that be? It is no more work to crack the root account than any 
>> other account. Nor any less. Hopefully too your clamav account has no 
>> shell defined.
>>     
>
> Indeed not.
>
> A local exploit is one thing, a local root exploit quite another. Now of 
> course it's more dangerous to run clamav as root, but for limiting write 
> access to the databases it would be better to have ownership as root. 
> Might not be worth it on balance, but I'm merely asking to see what the 
> developers' thought processes were rather than saying for sure what 
> would be better path to follow.
>   
We're talking about accesing to a different account. That being the root 
one or a daemon one
shouldn't make a difference. Perhaps you will trick user bin into 
visiting a malicious website?

The only scenario i can think it makes a difference would be if you had 
that part of the directory
 tree exported on nfs. You could have similar problems with other remote 
access tools which by
default block root access, but most won't allow you without a shell. And 
you shouldn't rely on the
defaults without at least studying the config anyway.

However, if you know where it makes a difference, please share.

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to