[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: SU: the mother of trojan horses
JF Martinez wrote:
>
> I consider the way SU is implemented in RedHat (and Indy) a serious
> security problem:
>
> Phase 1: You excute a program like normal user. That program without
> you knowing it installs a copy of it at $HOME/bin/ls and perhaps modify
> the .profile in order to ensure your ~/bin is in front of the path.
>
> Phase 2: One day you SU to root. Givzen that RedHat's root does not
> reset the PATH that means the trojan 'ls' will be executed and it will
> be with root access root rights
>
> Caldera manages this by reinitializing the environment (by the way
> don't look at SU source code the trick is in root's .bashrc and
> .bashrc_profile. This is not fully satisfactory because the means the
> root shell will have /root as $HOME value and when an X app is started
> from the root shell it will not be looking at the right place for the
> MIT cookie. Of course this is irrelevant because the $DISPLAY variable
> has also been lost when the environent was reinitialized.
>
> So either we fix the broken RedHat way to SU either we recommend the
> user to do regular logins.
So that's why Mandrake gives the "MIT-Magic-Cookie" error by default
and refuses to run programs after you su to a different user.
I brute forced my way out of it by copying ~/.Xsecurity from /home/user
to /root