On Thu, Mar 17, 2005 at 05:43:19AM +1100, [EMAIL PROTECTED] wrote:
> "Brendan O'Dea" <[EMAIL PROTECTED]> wrote:
> 
> > ... there's more at stake here than just PATH, since perl for example has
> > /usr/local/{lib,share}/perl earlier in @INC than /usr/{lib,share}/perl... 
> > 
> > I'm not sure what the emacs site-lisp search order is, but that may well
> > provide a similar vector.
> 
> Thanks for pointing out those avenues of attack.
> 
> In your summary you seem to have missed that any machines that share user
> files via writable NFS mounts are vulnerable. (Are vulnerable if you mount
> an NFS filesystem that is writable to others.)

No that is not true. You need to use root_squash for any semblance of
security anyway. In that case you can also use squash_gids to prevent
the attack. 

It is a security flaw with NFS rather than with Debian. I can design a
system so that random users can override any files not in group bin.
Will that make it a Debian bug?

Cheers,
-- 
Bill. <[EMAIL PROTECTED]>

Imagine a large red swirl here. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to