FOLLOWUP: Symlink/Core Security Hole for DU 4.0B

From: Sylvain Robitaille <syl_at_alcor.concordia.ca>
Date: Wed, 08 Apr 1998 22:55:37 -0400 (EDT)

My apologies to the list maintainer for followup, but I felt other list
subscribers would be interested in this bit of information.

On Mon, 6 Apr 1998, Richard L Jackson Jr wrote:
[ ... ]
> I contacted Digital CSC and was informed there may not be a patch for
> Digital UNIX 4.0B at this time but the engineer suggested a work
> around. Basically, turn on Enhanced C2 security and disable the
> creation of core files [ ... ]

For those who feel this may be a little too drastic, or otherwise
inconvenient, you might simply want to remove "other" read permission on
your SUID binaries. As it happens, a program won't dump core if the user
can't read the binary.

----------------------------------------------------------------------
Sylvain Robitaille syl_at_alcor.concordia.ca

Systems Manager Concordia University
Instructional & Information Technology Montreal, Quebec, Canada
----------------------------------------------------------------------
Received on Thu Apr 09 1998 - 04:56:58 NZST

This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:37 NZDT