The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


mail.local


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Thu, 13 Aug 1998 12:23:06 -0400
From: *Hobbit* <hobbit@avian.org>
To: BUGTRAQ@netspace.org
Subject: mail.local

lcamtuf brings up:

   mail.local - introduces new class of local bugs, from DoS attacks to

Easy to fix, in the scenarios you propose.  Protect mail.local and/or the
directory it's in so that only gid-mail processes can run it.  For extra
bonus points, stick it behind one of those setuid-wrapper hacks.

That doesn't address the /tmp problem, but changing PATH_LOCTMP should get
its temporaries going somewhere unavailable to normal users.  At least it's
making efforts to call mkstemp.

One thing I can't understand is why people keep doing things like

        if (strlen(buf) > 128)
            buf[128] = '\0';

If you're gonna hard-terminate a string at a safe length, just *do* it.  The
length check is irrelevant here, and just wastes time.  If the buffer is
filled to an unsafe length in the first place, you've probably already lost.

_H*

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру