Re: More modutils: It's probably worse.

2000-11-16 Thread Rusty Russell
In message <[EMAIL PROTECTED]> you write: > On 14 Nov 2000 11:42:42 -0800, > "H. Peter Anvin" <[EMAIL PROTECTED]> wrote: > >Seriously, though, I don't see any reason modprobe shouldn't accept > >funky filenames. There is a standard way to do that, which is to have > >an argument consisting of th

Re: More modutils: It's probably worse.

2000-11-15 Thread Keith Owens
On Wed, 15 Nov 2000 11:43:54 +0100, >Why is there any reason that a shell should be invoked anywhere in the >request_module->modprobe->insmod chain? >If implemented correctly, this attack should have the same result as >insmod ';chmod o+w .' (and it should not matter if it gets renamed so >that t

Re: More modutils: It's probably worse.

2000-11-15 Thread Tim Waugh
On Wed, Nov 15, 2000 at 11:43:54AM +0100, Olaf Titz wrote: > > plus the > > modprobe meta expansion algorithm. > > and I see no reason why modprobe should do any such thing, apart from > configurations dealt with in modules.conf anyway. If it helps, wordexp has a flag to prevent command substit

Re: More modutils: It's probably worse.

2000-11-15 Thread Olaf Titz
> The original exploit had nothing to do with filenames masquerading as > options, it was: ping6 -I ';chmod o+w .'. Then somebody pointed out Why is there any reason that a shell should be invoked anywhere in the request_module->modprobe->insmod chain? If implemented correctly, this attack shoul

Re: More modutils: It's probably worse.

2000-11-14 Thread Keith Owens
On 14 Nov 2000 11:42:42 -0800, "H. Peter Anvin" <[EMAIL PROTECTED]> wrote: >Seriously, though, I don't see any reason modprobe shouldn't accept >funky filenames. There is a standard way to do that, which is to have >an argument consisting of the string "--"; this indicates that any >further argu

Re: More modutils: It's probably worse.

2000-11-14 Thread H. Peter Anvin
Followup to: <[EMAIL PROTECTED]> By author:"Michael H. Warfield" <[EMAIL PROTECTED]> In newsgroup: linux.dev.kernel > > Oh, I hate to add to a remark like that (OK, I lied, I love > trollbait...) > > On Tue, Nov 14, 2000 at 11:20:35AM -0800, Ben Ford wrote: > > Olaf Kirch wrote: > > >

Re: More modutils: It's probably worse.

2000-11-14 Thread Michael H. Warfield
Oh, I hate to add to a remark like that (OK, I lied, I love trollbait...) On Tue, Nov 14, 2000 at 11:20:35AM -0800, Ben Ford wrote: > Olaf Kirch wrote: > > sure request_module _does_not_ accept funky module names. Why allow > > people to shoot themselves (and, by extension, all other Lin

Re: More modutils: It's probably worse.

2000-11-14 Thread Ben Ford
Olaf Kirch wrote: > sure request_module _does_not_ accept funky module names. Why allow > people to shoot themselves (and, by extension, all other Linux users > out there) in the foot? I thought that was the whole purpose of Unix/Linux? -b - To unsubscribe from this list: send the line "unsubs

Re: More modutils: It's probably worse.

2000-11-14 Thread Guest section DW
On Tue, Nov 14, 2000 at 09:59:22AM +0100, Olaf Kirch wrote: > PS: The load_nls code tries to check for buffer overflows, but > gets it wrong: > > struct nls_table *nls; > charbuf[40]; > > if (strlen(charset) > sizeof(buf) - sizeof("nls_")) > fail; >

Re: More modutils: It's probably worse.

2000-11-14 Thread David Schleef
On Tue, Nov 14, 2000 at 09:59:22AM +0100, Olaf Kirch wrote: > On Tue, Nov 14, 2000 at 12:06:32AM +0100, Michal Zalewski wrote: > > Maybe I am missing something, but at least for me, modprobe > > vulnerabilities are exploitable via privledged networking services, > > nothing more. > > Maybe not. n

Re: More modutils: It's probably worse.

2000-11-14 Thread Olaf Kirch
On Tue, Nov 14, 2000 at 12:06:32AM +0100, Michal Zalewski wrote: > Maybe I am missing something, but at least for me, modprobe > vulnerabilities are exploitable via privledged networking services, > nothing more. Maybe not. ncpfs for instance has an ioctl that seems to allow unprivileged users to