Newsgroups: comp.unix.questions
Path: utzoo!utgpu!jarvis.csri.toronto.edu!me!ip
From: ip@me.utoronto.ca (Bevis Ip)
Subject: Re: setuid shell scripts (was: Re: Running processes as root)
Message-ID: <89Oct25.200900edt.19443@me.utoronto.ca>
Organization: University of Toronto Mechanical Engineering
References: <21240@adm.BRL.MIL> <20329@mimsy.umd.edu> <3789@solo6.cs.vu.nl> <20367@mimsy.umd.edu> <3803@solo7.cs.vu.nl> <4917@tekcrl.LABS.TEK.COM> <3806@solo7.cs.vu.nl> <4920@tekcrl.LABS.TEK.COM>
Date: Wed, 25 Oct 89 20:08:57 EDT

>>Yeah, one must use the #! mechanism; SO WHAT!?  I never denied that!
>>And I showed how safe setuid scripts (NOTE: Chris didn't even say *shell*
>>scripts) could be created.  You want an example?  Right, put the following
>>in a file /etc/fubar:
>>
>>	#!/bin/sh /etc/fubar
>>	echo "Am I right or am I right?"
>>
>>You're a pretty smart fellow if you can break this one (or you're root).
>

Sigh... on some systems (SGI, for example), your script will never get
parsed after the first character.  There are more than just the
kernel which make setuid script insecure...

bevis
-- 
Bevis Ip                <>  ip@me.toronto.edu, ip@me.utoronto.ca
University of Toronto   <>  {pyramid,uunet}!utai!me!ip
Mechanical Engineering  <>  {allegra,decwrl}!utcsri!me!ip

