Bugtraq mailing list archives
bind running as root in Mandrake 7.0
From: nico () MONNET TO (Nicolas MONNET)
Date: Sat, 3 Jun 2000 16:03:51 +0200
bind is run as user / group 'root' in Mandrake 7.0, and probably in
Redhat6.x as well. This is a surprising (if not stupid) setting given the
fact that sploits exist that easily break out of any chroot jail in such a
case; and that switching users is as easy as adding an option to
named. Esp. given the infuriatingly poor security track record of named
...
Indeed, here's a simple patch against /etc/rc.d/init.d/named that I
strongly suggest applying. It does'nt seem to cause any problem for me.
*** named.orig Sat Jun 3 15:55:00 2000
--- named Fri Jun 2 22:04:10 2000
***************
*** 28,34 ****
start)
# Start daemons.
echo -n "Starting named: "
! daemon named
RETVAL=$?
[ $RETVAL -eq 0 ] && touch /var/lock/subsys/named
echo
--- 28,34 ----
start)
# Start daemons.
echo -n "Starting named: "
! daemon named -u nobody -g nogroup
RETVAL=$?
[ $RETVAL -eq 0 ] && touch /var/lock/subsys/named
echo
Current thread:
- Re: Remote DoS attack in Real Networks Real Server (Strike #2) vulnerability Ryan Russell (Jun 01)
- Re: Remote DoS attack in Real Networks Real Server (Strike #2) vulnerability Christopher Schulte (Jun 02)
- bind running as root in Mandrake 7.0 Nicolas MONNET (Jun 03)
- Re: bind running as root in Mandrake 7.0 Brock Sides (Jun 03)
- Re: bind running as root in Mandrake 7.0 White Vampire (Jun 03)
- Re: bind running as root in Mandrake 7.0 Andrew L . Davis (Jun 04)
- Re: bind running as root in Mandrake 7.0 Elias Levy (Jun 08)
- Circumventing Outlook Security Update File Download Security With IFRAMEs cassius () HUSHMAIL COM (Jun 09)
- Re: bind running as root in Mandrake 7.0 Nathan Neulinger (Jun 11)
- Remote DoS for Mercur 3.2 |[TDP]| (Jun 13)
- Vulnerability in Solaris ufsrestore Job de Haas (Jun 14)
- <Possible follow-ups>
- Re: Remote DoS attack in Real Networks Real Server (Strike #2) Vulnerability Christopher Schulte (Jun 02)
