On Thu, Dec 28, 2000 at 02:34:50PM -0800, "Optyx - Uberhax0r 
Communications"@SECURITYFOCUS.COM wrote:

> /usr/sbin/audlinks has the following behavior:
> $ id
> uid=100(optyx) gid=1(other)
> $ mkdir -p /tmp/b/dev
> $ ln -s /.rhosts /tmp/b/dev/.devfsadm_dev.lock
> $ su root
> Password:
> # /usr/sbin/audlinks -r /tmp/b
> # ls -l /.rhosts
> -rw-r--r--   1 root     other          4 Dec 28 14:28 /.rhosts

As far as I know audlinks is deprecated for at least Solaris 8.
Devfsadm(1M) maintains the /dev and /devices namespaces. It replaces the
previous suite of devfs administration tools including audlinks(1M).

Casper Dik already mentioned that the generated /.rhosts file would
be useless if you plan to gain root privilegdes using rsh/rlogin.

But I'd like to add that I can't see a real vulnerability in the above
scenario. audlinks is used to add the audio symlinks and the sound
directory to the devices of a system (/dev), why the hell should an
administrator create these files in a directory owned by user in /tmp.

I can only imagine that an administrator mounts another root filesystem
and creates audlinks manuals, e.g.

    /usr/sbin/mount /dev/dsk/c0t0d0s0 /a
    /usr/sbin/audlinks -r /a

But in this case /a wouldn't be worldwritable. I can't see any problem
with audlinks. Sorry.

Regards,
Konrad

--
Konrad Rieck <[EMAIL PROTECTED]>         Roqefellaz - http://www.r0q.cx
Fingerprint: 3AA8 CF92 C179 9760 C3B3  1B43 33B6 9221 AFBF 5897
--                 GPG Public Key http://www.r0q.cx/keys/kr.pub

Reply via email to