On a Solaris 8, i386 machine, I did the following:

$ ls -al
drwxr-xr-x  4  j      other   512 May 28, 14:12 .
drwxr-xr-x  5  root   root    512 May 28, 14:10 ..
lrwxrwxrwx  1  j      other     6 May 28, 14:12 .plan -> myplan
-rw-------  1  nobody nobody   17 May 28, 14:12 myplan
$ finger -l j@localhost
[localhost]
Login name: j
Directory name: /export/home/j           Shell: /bin/sh
Last login Mon May 28, 14:12 on console from :0
No unread mail.
No plan.

After I changed the mod of myplan to world-readable, finger gave me

$ finger -l j@localhost
[localhost]
Login name: j
Directory name: /export/home/j           Shell: /bin/sh
Last login Mon May 28, 14:12 on console from :0
No unread mail.
Plan:
This is my plan.

So I'd say in.fingerd is not vulnerable for the symlink attack you
describe.

J. Bol

Lukasz Luzar wrote:

> Hello,
>
>  Ok, the example wasn't good.
>  It was a long day for me, thus, please forgive me that slip-up.
>
>  The sym-links attack is very useful when you want to read
>  files that are readable only by unprivileged user.
>
>  On example, many httpd servers works with the same privilages,
>  it means that you can read any CGI temporary file, and other
>  files readable only by CGI scripts.
>
>  I think about a case where a CGI script saves some important
>  information in a temporary file, like PHP do with the sessions:
>
>   -rw------- 1 nobody nobody    329 May 14 12:16  /tmp/sess_0cd156a633
>
>  When you have installed in.fingerd, and the in.fingerd is vulnerable,
>  all local users are able to read the information from the files.
>
>  There are few other examples.
>
> --
> Lukasz Luzar
> http://Developers.of.PL/
> Crede quod habes, et habes

Reply via email to