Re: makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Jan Minar
On Tue, Apr 20, 2004 at 11:40:13AM +1000, Russell Coker wrote: > On Tue, 20 Apr 2004 07:50, Jan Minar <[EMAIL PROTECTED]> wrote: > > It seems like they should be 660, not 600, as I suggested (wall(1) and > > talkd(1) would break otherwise, probably). > > What prevents wall from sending those escap

Re: makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Russell Coker
On Tue, 20 Apr 2004 07:50, Jan Minar <[EMAIL PROTECTED]> wrote: > It seems like they should be 660, not 600, as I suggested (wall(1) and > talkd(1) would break otherwise, probably). What prevents wall from sending those escape sequences? -- http://www.coker.com.au/selinux/ My NSA Security Enha

Re: makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Russell Coker
On Tue, 20 Apr 2004 07:50, Jan Minar <[EMAIL PROTECTED]> wrote: > It seems like they should be 660, not 600, as I suggested (wall(1) and > talkd(1) would break otherwise, probably). What prevents wall from sending those escape sequences? -- http://www.coker.com.au/selinux/ My NSA Security Enha

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Michael Stone
On Mon, Apr 19, 2004 at 11:18:51PM +0200, Jan Minar wrote: It's not about Eterm, or the console.c in Linux, or the tty permissions, it's about the bigger picture. The bigger picture is that there are security problems and there are security problems. The only specific problem you pointed out is

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 06:40:35PM +0200, Jan Minar wrote: > Could You tell us what _exactly_ happened? (DWN cover-story ;-)) Are > there no testsuites/scripts to ensure basic sanity of the packages being > built packages? Or what _exactly_ was the mistake (I'm personally > interested in the se

Re: makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Jan Minar
Hi, Phillip! Thank for a storm-swift reply 8-) It seems like they should be 660, not 600, as I suggested (wall(1) and talkd(1) would break otherwise, probably). On Mon, Apr 19, 2004 at 05:26:25PM -0400, Phillip Hofmeister wrote: > yes, the others are 666. Does it matter? Are they used or just

[no subject]

2004-04-19 Thread VSW24 . de
Title: www   www.VSW24.de Ihr Hardware und Software Discounter im Internet   Große Gutschein Aktion!! Einfach Gutschein per Mail anfordern und beim Kauf von einem Komplett PC Noch mal 15 € Sparen! Auch wenn Sie sich Ihren PC Selber zusammen Stellen. Wir senken die

Re: [SECURITY] [DSA 483-1] New mysql packages fix insecure temporary file creation

2004-04-19 Thread Christian Hammers
Hello On Mon, 19 Apr 2004 08:57:39 +0200 (CEST) Tomas Pospisek wrote: > * mysql unstable (4.0.18-4) changelog says: > > > Aplied fix for unprobable tempfile-symlink security problem in > > mysqlbug reported by Shaun Colley on bugtraq on 2004-03-24. > > but doesn't mention the CAN numbers.

Re: makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Phillip Hofmeister
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [EMAIL PROTECTED]:~$ ls -l /dev/tty0 crw---1 root root 4, 0 Jul 19 2002 /dev/tty0 [EMAIL PROTECTED]:~$ ls -l /dev/tty1 crw---1 root root 4, 1 Apr 18 21:03 /dev/tty1 [EMAIL PROTECTED]:~$ ls -l /dev/tty2 crw--

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Jan Minar
On Mon, Apr 19, 2004 at 01:07:59PM -0700, Matt Zimmerman wrote: > On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote: > > > And as a part of this community, I am... > > [doing more pointing and whining] We are going astray. Maybe a time to rephrase... We have security issues in Debian st

makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Jan Minar
Package: makedev Version: 2.3.1-58 Severity: important Tags: security Hi Please check the permissions of /dev/tty([0-9])*, they seem to be a free-for-all, which is no good. Thanks to Stephen Gran for telling me who to bug. The following patch would do, afaict: --- /sbin/MAKEDEV.ORIG Mon Apr 1

jacksonian

2004-04-19 Thread Blanca Guevara
Hello Debian-security-private (Mon, 19 Apr 2004 17:46:51 -0300)

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Phillip Hofmeister
I believe that the permissions are changed to allow a logged in user to access that terminal. The permissions are handled and reset by the appropriate log in service. [EMAIL PROTECTED]:~$ ls -lh /dev/pts/3 crw---1 plhofmei tty 136, 3 Apr 19 16:47 /dev/pts/3 [EMAIL PROTECTED]:~$ Ot

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Michael Stone
On Mon, Apr 19, 2004 at 11:18:51PM +0200, Jan Minar wrote: It's not about Eterm, or the console.c in Linux, or the tty permissions, it's about the bigger picture. The bigger picture is that there are security problems and there are security problems. The only specific problem you pointed out is jus

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 06:40:35PM +0200, Jan Minar wrote: > Could You tell us what _exactly_ happened? (DWN cover-story ;-)) Are > there no testsuites/scripts to ensure basic sanity of the packages being > built packages? Or what _exactly_ was the mistake (I'm personally > interested in the se

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Stephen Gran
This one time, at band camp, Matt Zimmerman said: > On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote: > > % ssh kh > > [EMAIL PROTECTED]'s password: > > Linux kontryhel 2.4.26-jan #3 SMP Mon Apr 19 05:00:00 CEST 2004 i686 unknown > > % echo 'Morning, Mister root, welcome to a jail 8-)' > /

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote: > And as a part of this community, I am... > [doing more pointing and whining] Did you miss the bit where I said that didn't help? > Haha, I can feel the free spirit of the computer labs of the late > sixties: > > /usr/src/linux/drivers

Re: makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Jan Minar
Hi, Phillip! Thank for a storm-swift reply 8-) It seems like they should be 660, not 600, as I suggested (wall(1) and talkd(1) would break otherwise, probably). On Mon, Apr 19, 2004 at 05:26:25PM -0400, Phillip Hofmeister wrote: > yes, the others are 666. Does it matter? Are they used or just

[no subject]

2004-04-19 Thread VSW24 . de
Title: www   www.VSW24.de Ihr Hardware und Software Discounter im Internet   Große Gutschein Aktion!! Einfach Gutschein per Mail anfordern und beim Kauf von einem Komplett PC Noch mal 15 € Sparen! Auch wenn Sie sich Ihren PC Selber zusammen Stellen. Wir senken die

Re: [SECURITY] [DSA 483-1] New mysql packages fix insecure temporary file creation

2004-04-19 Thread Christian Hammers
Hello On Mon, 19 Apr 2004 08:57:39 +0200 (CEST) Tomas Pospisek wrote: > * mysql unstable (4.0.18-4) changelog says: > > > Aplied fix for unprobable tempfile-symlink security problem in > > mysqlbug reported by Shaun Colley on bugtraq on 2004-03-24. > > but doesn't mention the CAN numbers.

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Jan Minar
On Mon, Apr 19, 2004 at 11:18:41AM -0700, Matt Zimmerman wrote: > On Mon, Apr 19, 2004 at 07:51:27PM +0200, Jan Minar wrote: > > > Come on, Matt: Virtually all terminal emulators are vulnerable, and the > > vulnerability is a common knowledge. The abovementioned paper was on > > Bugtraq 2003-02-

Re: makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Phillip Hofmeister
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [EMAIL PROTECTED]:~$ ls -l /dev/tty0 crw---1 root root 4, 0 Jul 19 2002 /dev/tty0 [EMAIL PROTECTED]:~$ ls -l /dev/tty1 crw---1 root root 4, 1 Apr 18 21:03 /dev/tty1 [EMAIL PROTECTED]:~$ ls -l /dev/tty2 crw--

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Jan Minar
On Mon, Apr 19, 2004 at 01:07:59PM -0700, Matt Zimmerman wrote: > On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote: > > > And as a part of this community, I am... > > [doing more pointing and whining] We are going astray. Maybe a time to rephrase... We have security issues in Debian st

makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Jan Minar
Package: makedev Version: 2.3.1-58 Severity: important Tags: security Hi Please check the permissions of /dev/tty([0-9])*, they seem to be a free-for-all, which is no good. Thanks to Stephen Gran for telling me who to bug. The following patch would do, afaict: --- /sbin/MAKEDEV.ORIG Mon Apr 1

jacksonian

2004-04-19 Thread Blanca Guevara
Hello Debian-security-private (Mon, 19 Apr 2004 17:46:51 -0300)

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Phillip Hofmeister
I believe that the permissions are changed to allow a logged in user to access that terminal. The permissions are handled and reset by the appropriate log in service. [EMAIL PROTECTED]:~$ ls -lh /dev/pts/3 crw---1 plhofmei tty 136, 3 Apr 19 16:47 /dev/pts/3 [EMAIL PROTECTED]:~$ Ot

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 07:51:27PM +0200, Jan Minar wrote: > Come on, Matt: Virtually all terminal emulators are vulnerable, and the > vulnerability is a common knowledge. The abovementioned paper was on > Bugtraq 2003-02-24 21:02:52... Is the Security Team going to do > something about it them

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Stephen Gran
This one time, at band camp, Matt Zimmerman said: > On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote: > > % ssh kh > > [EMAIL PROTECTED]'s password: > > Linux kontryhel 2.4.26-jan #3 SMP Mon Apr 19 05:00:00 CEST 2004 i686 unknown > > % echo 'Morning, Mister root, welcome to a jail 8-)' > /

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote: > And as a part of this community, I am... > [doing more pointing and whining] Did you miss the bit where I said that didn't help? > Haha, I can feel the free spirit of the computer labs of the late > sixties: > > /usr/src/linux/drivers

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Jan Minar
On Mon, Apr 19, 2004 at 09:32:47AM -0700, Matt Zimmerman wrote: > On Mon, Apr 19, 2004 at 06:08:51PM +0200, Jan Minar wrote: > > > On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote: > > > untrusted source. This is a fundamental Unix feature (or flaw). Terminal > > > control sequence

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Jan Minar
On Mon, Apr 19, 2004 at 11:18:41AM -0700, Matt Zimmerman wrote: > On Mon, Apr 19, 2004 at 07:51:27PM +0200, Jan Minar wrote: > > > Come on, Matt: Virtually all terminal emulators are vulnerable, and the > > vulnerability is a common knowledge. The abovementioned paper was on > > Bugtraq 2003-02-

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-19 Thread Jan Minar
On Sat, Apr 17, 2004 at 06:10:36PM -0400, Michael Stone wrote: > The big problem is that the kernel situation in woody blows. There are > too many kernels and they don't build consistently. Hopefully things > will be better in sarge (although if you look at the number of kernels > out there the fut

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 06:08:51PM +0200, Jan Minar wrote: > On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote: > > untrusted source. This is a fundamental Unix feature (or flaw). Terminal > > control sequences may be contained in the data. > > I've read this [1]analysis by by H D

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 07:51:27PM +0200, Jan Minar wrote: > Come on, Matt: Virtually all terminal emulators are vulnerable, and the > vulnerability is a common knowledge. The abovementioned paper was on > Bugtraq 2003-02-24 21:02:52... Is the Security Team going to do > something about it them

Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Jan Minar
On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote: > untrusted source. This is a fundamental Unix feature (or flaw). Terminal > control sequences may be contained in the data. I've read this [1]analysis by by H D Moore. No matter how convenient the escape sequences that allow injec

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Jan Minar
On Mon, Apr 19, 2004 at 09:32:47AM -0700, Matt Zimmerman wrote: > On Mon, Apr 19, 2004 at 06:08:51PM +0200, Jan Minar wrote: > > > On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote: > > > untrusted source. This is a fundamental Unix feature (or flaw). Terminal > > > control sequence

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-19 Thread Jan Minar
On Sat, Apr 17, 2004 at 06:10:36PM -0400, Michael Stone wrote: > The big problem is that the kernel situation in woody blows. There are > too many kernels and they don't build consistently. Hopefully things > will be better in sarge (although if you look at the number of kernels > out there the fut

Re: Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 06:08:51PM +0200, Jan Minar wrote: > On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote: > > untrusted source. This is a fundamental Unix feature (or flaw). Terminal > > control sequences may be contained in the data. > > I've read this [1]analysis by by H D

Eterm & others allow arbitrary commands execution via escape sequencies [Was: CAN-2003-0020?]

2004-04-19 Thread Jan Minar
On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote: > untrusted source. This is a fundamental Unix feature (or flaw). Terminal > control sequences may be contained in the data. I've read this [1]analysis by by H D Moore. No matter how convenient the escape sequences that allow injec

Re: syslog.conf question

2004-04-19 Thread Costas Magkos
On 18/04/04 17:41, Philipp Schulte wrote: LeVA wrote: I'm trying to exclude my mailsystem's logs from the /var/log/syslog file. I've changed this line in /etc/syslog.conf: *.*;auth,authpriv.none -/var/log/syslog to: *.*;auth,authpriv.none;mail.!* -/var/log/syslog Try "*.*;auth,a

Re: syslog.conf question

2004-04-19 Thread Costas Magkos
On 18/04/04 17:41, Philipp Schulte wrote: LeVA wrote: I'm trying to exclude my mailsystem's logs from the /var/log/syslog file. I've changed this line in /etc/syslog.conf: *.*;auth,authpriv.none -/var/log/syslog to: *.*;auth,authpriv.none;mail.!* -/var/log/syslog Try "*.*;auth,authp

unsubscribe

2004-04-19 Thread Adam Barton
On Monday, April 19, 2004, at 03:06AM, Matt Zimmerman <[EMAIL PROTECTED]> wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >- -- >Debian Security Advisory DSA 492-1 [EMAIL PROTECTED] >http://www.d

Re: [SECURITY] [DSA 483-1] New mysql packages fix insecure temporary file creation

2004-04-19 Thread Tomas Pospisek
On Wed, 14 Apr 2004, Martin Schulze wrote: > CAN-2004-0381 > > The script mysqlbug in MySQL allows local users to overwrite > arbitrary files via a symlink attack. > > CAN-2004-0388 > > The script mysqld_multi in MySQL allows local users to overwrite > arbitrary files via a symlink

unsubscribe

2004-04-19 Thread Adam Barton
On Monday, April 19, 2004, at 03:06AM, Matt Zimmerman <[EMAIL PROTECTED]> wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >- -- >Debian Security Advisory DSA 492-1 [EMAIL PROTECTED] >http://www.d

Re: [SECURITY] [DSA 483-1] New mysql packages fix insecure temporary file creation

2004-04-19 Thread Tomas Pospisek
On Wed, 14 Apr 2004, Martin Schulze wrote: > CAN-2004-0381 > > The script mysqlbug in MySQL allows local users to overwrite > arbitrary files via a symlink attack. > > CAN-2004-0388 > > The script mysqld_multi in MySQL allows local users to overwrite > arbitrary files via a symlink