Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-20 Thread Jean-Daniel Dupas
Le 20 juin 08 à 06:09, Ken Thomases a écrit : On Jun 19, 2008, at 10:39 PM, Jens Alfke wrote: It might not be a bad idea to proactively disarm this vulnerability on your own machine(s), as I just did: sudo chmod -s System/Library/CoreServices/RemoteManagement/ ARDAgent.app/ARDAgent Tha

Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread Dave Carrigan
On Jun 19, 2008, at 9:10 PM, Jerry LeVan wrote: I removed my user name from the "allow access from only these users" and the hack quit working... I added myself back in and turned on all of the options and the hack still does not work... Apparently, the attack only works if Remote Manag

Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread Derek Chesterfield
On 20 Jun 2008, at 05:10, Jerry LeVan wrote: On Jun 19, 2008, at 11:39 PM, Jens Alfke wrote: It might not be a bad idea to proactively disarm this vulnerability on your own machine(s), as I just did: sudo chmod -s System/Library/CoreServices/RemoteManagement/ ARDAgent.app/ARDAgent Tha

Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread Jerry LeVan
On Jun 19, 2008, at 11:39 PM, Jens Alfke wrote: It might not be a bad idea to proactively disarm this vulnerability on your own machine(s), as I just did: sudo chmod -s System/Library/CoreServices/RemoteManagement/ ARDAgent.app/ARDAgent That turns off the setuid bit. I'm sure that'll bre

Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread Ken Thomases
On Jun 19, 2008, at 10:39 PM, Jens Alfke wrote: It might not be a bad idea to proactively disarm this vulnerability on your own machine(s), as I just did: sudo chmod -s System/Library/CoreServices/RemoteManagement/ ARDAgent.app/ARDAgent That's sudo chmod -s /System/Library/CoreServices/

Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread Jens Alfke
It might not be a bad idea to proactively disarm this vulnerability on your own machine(s), as I just did: sudo chmod -s System/Library/CoreServices/RemoteManagement/ ARDAgent.app/ARDAgent That turns off the setuid bit. I'm sure that'll break Remote Desktop functionality, but that's still

Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread Andrew Farmer
On 19 Jun 08, at 07:22, Jerry LeVan wrote: Last night while browsing Slashdot I found this: http://it.slashdot.org/it/08/06/18/1919224.shtml It gives a simple command that can be used to basically execute code as root. osascript -e 'tell app "ARDAgent" to do shell script "whoami"' The above w

Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread Jean-Daniel Dupas
cript support (including "do shell script"), so any Cocoa app that runs with suid is a security risk unless you short circuit the Foundation scripting support. Cheers, Chuck --- On Thu, 6/19/08, Jerry LeVan <[EMAIL PROTECTED]> wrote: From: Jerry LeVan <[EMAIL PROTECTED]> Su

Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread Charles Steinman
scripting support. Cheers, Chuck --- On Thu, 6/19/08, Jerry LeVan <[EMAIL PROTECTED]> wrote: > From: Jerry LeVan <[EMAIL PROTECTED]> > Subject: Cocoa can be used to execute arbitrary (privileged) code ! > To: "cocoa-Dev Dev" > Date: Thursday, June 19, 2008, 7:22 AM

Re: Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread lbland
hi- There are better ways to do this, but I'm not commenting. :-) thanks!- -lance On Jun 19, 2008, at 10:22 AM, Jerry LeVan wrote: Last night while browsing Slashdot I found this: http://it.slashdot.org/it/08/06/18/1919224.shtml It gives a simple command that can be used to basically execut

Cocoa can be used to execute arbitrary (privileged) code !

2008-06-19 Thread Jerry LeVan
Last night while browsing Slashdot I found this: http://it.slashdot.org/it/08/06/18/1919224.shtml It gives a simple command that can be used to basically execute code as root. osascript -e 'tell app "ARDAgent" to do shell script "whoami"' The above will print "root" and replacing "whoami" will