Security hole in tar on Microport

Paul De Bra debra at alice.UUCP
Thu Nov 3 13:33:48 AEST 1988


In article <10750 at ico.ISC.COM> rcd at ico.ISC.COM (Dick Dunn) writes:
]In article <226 at sea375.UUCP>, dave at sea375.UUCP (David A. Wilson) writes:
]> I have a problem with using tar on microport. I created a tar floppy
]> on a system as an unpriviledged user. When I extracted the floppy on
]> another system running Microport System V/AT version 2.3 all the files
]> extracted were owned by the userid of the other system...
]
]Remember that tar is a V7-ish program.  It just extracts files and chowns
]them back to the original owners as recorded on the archive...
]
]Under V7 (and BSD) chown is effectively restricted to root; you can't give
]away files.  Thus tar, as it is written, works sensibly.  Under Sys V, you
]can chown a file to someone else if you own it.  You may regard this as a
]feature or a bug in chown, but in any case it's a mismatch to the way tar
]is written.
]
There used to be a serious security problem with this (could I say faulty?)
behaviour of chown, when combined with the "at" command. I don't know about
the more recent Unix versions but I was once using a System III version where
you could submit a job with "at", this created a "job" file in some spool
directory, which you could subsequently edit and then chown to root. Then
at the correct time "atrun" would think this was a job for root and thus
execute it as root...

Paul.
-- 
------------------------------------------------------
|debra at research.att.com   | uunet!research!debra     |
------------------------------------------------------



More information about the Comp.unix.microport mailing list