Ben Collins wrote:
> Now when dpkg first unpacks a package, it replaces binaries by first,
> chmod 600 on the binary (I'm not sure why, but it does), then unlinking
> it.

The reason why dpkg does this is because of a neat little hard link exploit.

[EMAIL PROTECTED]:/tmp>ln /usr/gamesxthrust
[EMAIL PROTECTED]:/tmp>ls -l xthrust 
-rwxr-sr-x   2 root     games      251984 Sep 20 20:45 xthrust*

Now if a bug is found in xthrust that lets me get access to the games group,
the sysadmin quickly fixes it by installing a new binary. But I already have
made a hard link to the old one (and note the hard link has the same
permissions), so I can log in and run it at my leisure later and exploit the
hole. Of course, this works for suid executables too.

The fix is to clear the suid and sgid bits of the binary before you delete
it. So when dpkg goes in and upgrades xthrust, it first chowns the old file,
and I end up with just this, which isn't helpful to me as a cracker:

[EMAIL PROTECTED]:/tmp>ls -l xthrust
-rw-------   2 root     games      251984 Sep 20 20:45 xthrust

Now, what confuses me is why dpkg is doing this to perl, which isn't suid or
sgid at all. The dpkg code uses this:

int chmodsafe_unlink(const char *pathname) {
  struct stat stab;
  
  if (lstat(pathname,&stab)) return -1;
  if (S_ISREG(stab.st_mode) ? (stab.st_mode | 07000) :
      !(S_ISLNK(stab.st_mode) || S_ISDIR(stab.st_mode) ||
   S_ISFIFO(stab.st_mode) || S_ISSOCK(stab.st_mode))) {
    /* We chmod it if it is 1. a sticky or set-id file, or 2. an unrecognised
     * object (ie, not a file, link, directory, fifo or socket
     */
   if (chmod(pathname,0600)) return -1;
  }
  if (unlink(pathname)) return -1;
  return 0;
} 

-- 
see shy jo

Reply via email to