Re: tcpdump -z
On 08/27/2010 10:32 AM, Vadim Goncharov wrote:
> This is a froward message from tcpdump-workers mail list:
> === 8< ================>8 ===
> $ sudo ./tcpdump -i any -G 1 -z ./test.sh -w dump port 55555
> [sudo] password for user:
> tcpdump: listening on any, link-type LINUX_SLL (Linux cooked), capture size
> 65535 bytes
> (generate some traffic on port 55555)
> root@blaa ~/temp/tcpdump-4.1.1$ id
> uid=0(root) gid=0(root) groups=0(root)
>
> Is this known and accepted? Could this option maybe be implemented
> differently?
In my opinion, if you allow people to run tools as root using sudo,
you'd better make sure those tools don't allow attackers to easily gain
root access. In the case of tcpdump, the '-w' flag most probably already
allowed that, although '-z' is a bit more convenient to the attacker.
As a solution, configure your sudo correctly, only allowing specific
tcpdump command line options (or option sets) to be used.
--
Pieter
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
討論串 (同標題文章)
完整討論串 (本文為第 2 之 13 篇):