Package: courier-authdaemon
Version: 0.63.0-2
Severity: normal
Tags: security

/var/run/courier/authdaemon is writable by user daemon. So, if
that user is compromised, root-owned
/var/run/courier/authdaemon/pid can be deleted and replaced with
a new file containing an arbitrary pid, such as 1. Then
/etc/init.d/courier-authdaemon stop will proceed to kill an
arbitrary process.

start-stop-daemon avoids this kind of security flaw by checking
/proc/pid/exe (when run with -exec), or at least the process name (when
run with -name). authdaemon's init script does not use it.

Besides the potential security hole, killing a process that
is stored in a pid file without checking that the pid file is accurate
is asking for trouble. Things go wrong, and pid files, stale.

-- 
see shy jo



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to