Bugtraq mailing list archives
bind running as root in Mandrake 7.0
From: nico () MONNET TO (Nicolas MONNET)
Date: Sat, 3 Jun 2000 16:03:51 +0200
bind is run as user / group 'root' in Mandrake 7.0, and probably in Redhat6.x as well. This is a surprising (if not stupid) setting given the fact that sploits exist that easily break out of any chroot jail in such a case; and that switching users is as easy as adding an option to named. Esp. given the infuriatingly poor security track record of named ... Indeed, here's a simple patch against /etc/rc.d/init.d/named that I strongly suggest applying. It does'nt seem to cause any problem for me. *** named.orig Sat Jun 3 15:55:00 2000 --- named Fri Jun 2 22:04:10 2000 *************** *** 28,34 **** start) # Start daemons. echo -n "Starting named: " ! daemon named RETVAL=$? [ $RETVAL -eq 0 ] && touch /var/lock/subsys/named echo --- 28,34 ---- start) # Start daemons. echo -n "Starting named: " ! daemon named -u nobody -g nogroup RETVAL=$? [ $RETVAL -eq 0 ] && touch /var/lock/subsys/named echo
Current thread:
- Re: Remote DoS attack in Real Networks Real Server (Strike #2) vulnerability Ryan Russell (Jun 01)
- Re: Remote DoS attack in Real Networks Real Server (Strike #2) vulnerability Christopher Schulte (Jun 02)
- bind running as root in Mandrake 7.0 Nicolas MONNET (Jun 03)
- Re: bind running as root in Mandrake 7.0 Brock Sides (Jun 03)
- Re: bind running as root in Mandrake 7.0 White Vampire (Jun 03)
- Re: bind running as root in Mandrake 7.0 Andrew L . Davis (Jun 04)
- Re: bind running as root in Mandrake 7.0 Elias Levy (Jun 08)
- Circumventing Outlook Security Update File Download Security With IFRAMEs cassius () HUSHMAIL COM (Jun 09)
- Re: bind running as root in Mandrake 7.0 Nathan Neulinger (Jun 11)
- Remote DoS for Mercur 3.2 |[TDP]| (Jun 13)
- Vulnerability in Solaris ufsrestore Job de Haas (Jun 14)
- <Possible follow-ups>
- Re: Remote DoS attack in Real Networks Real Server (Strike #2) Vulnerability Christopher Schulte (Jun 02)