<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: /usr/lbin/ executables with suid bits in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918599#M752333</link>
    <description>Thanks for the input. &lt;BR /&gt;&lt;BR /&gt;Patrick:&lt;BR /&gt;We have a policy that only the root user can use SAM. So if SAM is the only "script" that uses these executables the bit is not nessesary. My problem is that i have no idea what the reason is for the suid bit. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;S.K. &lt;BR /&gt;Some commands in /usr/bin have suid bits of there own. Why these bits?&lt;BR /&gt;&lt;BR /&gt;Gideon&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Tue, 04 Mar 2003 16:15:15 GMT</pubDate>
    <dc:creator>G. Vrijhoeven</dc:creator>
    <dc:date>2003-03-04T16:15:15Z</dc:date>
    <item>
      <title>/usr/lbin/ executables with suid bits</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918596#M752330</link>
      <description>Hi all,&lt;BR /&gt;&lt;BR /&gt;In /usr/lbin you can find a the executables&lt;BR /&gt;/usr/lbin/chgpt  &lt;BR /&gt;/usr/lbin/exrecover&lt;BR /&gt;/usr/lbin/protect_pty  &lt;BR /&gt;&lt;BR /&gt;The owner is root and the executables have a suid bit set on. I can not find any man page on the executables. Can S.O. tell me what the executables do and what the consequenses will be if the suid bits are be removed.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance,&lt;BR /&gt;&lt;BR /&gt;Gideon&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Mar 2003 15:52:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918596#M752330</guid>
      <dc:creator>G. Vrijhoeven</dc:creator>
      <dc:date>2003-03-04T15:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: /usr/lbin/ executables with suid bits</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918597#M752331</link>
      <description>If you remove the suid bits, then SAM will probably not function correctly.  The executables in /usr/lbin are backend executables used by SAM for various things.&lt;BR /&gt;&lt;BR /&gt;If you have an 11.11 system there will be man pages for some of the things there (modprpw and getprpw come to mind).</description>
      <pubDate>Tue, 04 Mar 2003 15:57:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918597#M752331</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2003-03-04T15:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: /usr/lbin/ executables with suid bits</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918598#M752332</link>
      <description>You are right .. all commands in /usr/lbin are not documented because they are not for regular use (ie not for the user to run from commnad line for example). What I know is in general they are used or called by some other command in /usr/bin for instance. Hence I would leave them untouched.</description>
      <pubDate>Tue, 04 Mar 2003 15:59:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918598#M752332</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2003-03-04T15:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: /usr/lbin/ executables with suid bits</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918599#M752333</link>
      <description>Thanks for the input. &lt;BR /&gt;&lt;BR /&gt;Patrick:&lt;BR /&gt;We have a policy that only the root user can use SAM. So if SAM is the only "script" that uses these executables the bit is not nessesary. My problem is that i have no idea what the reason is for the suid bit. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;S.K. &lt;BR /&gt;Some commands in /usr/bin have suid bits of there own. Why these bits?&lt;BR /&gt;&lt;BR /&gt;Gideon&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Mar 2003 16:15:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918599#M752333</guid>
      <dc:creator>G. Vrijhoeven</dc:creator>
      <dc:date>2003-03-04T16:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: /usr/lbin/ executables with suid bits</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918600#M752334</link>
      <description>Found this on chgpt&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.ornl.gov/cts/archives/mailing-lists/tru64-unix-managers/2002/09/msg00187.html" target="_blank"&gt;http://www.ornl.gov/cts/archives/mailing-lists/tru64-unix-managers/2002/09/msg00187.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;An internet search also turned up references to an overflow buffer bug in the Solaris /usr/lib/exrecover binary.  &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.iss.net/security_center/static/5913.php" target="_blank"&gt;http://www.iss.net/security_center/static/5913.php&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;and a possible explanation of its function:&lt;BR /&gt;&lt;A href="http://linux.oreillynet.com/pub/a/linux/2001/01/15/insecurities.html" target="_blank"&gt;http://linux.oreillynet.com/pub/a/linux/2001/01/15/insecurities.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.lbl.gov/ITSD/CIS/faqs/UNIX_Faq/15.html" target="_blank"&gt;http://www.lbl.gov/ITSD/CIS/faqs/UNIX_Faq/15.html&lt;/A&gt;</description>
      <pubDate>Tue, 04 Mar 2003 16:25:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918600#M752334</guid>
      <dc:creator>James A. Donovan</dc:creator>
      <dc:date>2003-03-04T16:25:42Z</dc:date>
    </item>
    <item>
      <title>Re: /usr/lbin/ executables with suid bits</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918601#M752335</link>
      <description>suid programs are fundamental to UNIX and are not a problem unless they can be overwritten by unauthorised users i.e. their permissions are wrong.&lt;BR /&gt;&lt;BR /&gt;All the ones in /usr/lbin have write access to nobody so are not a problem.&lt;BR /&gt;&lt;BR /&gt;The reason for suid programs...&lt;BR /&gt;Consider the passwd command, it has to write to /etc/passwd, /etc/passwd has permissions -r--r--r-- so can only by written to by root. The root suid program 'passwd' runs with an effective uid of root so can write to /etc/passwd. &lt;BR /&gt;&lt;BR /&gt;Personally I'd leave the programs in /usr/lbin alone...&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;John&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Mar 2003 16:42:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918601#M752335</guid>
      <dc:creator>John Palmer</dc:creator>
      <dc:date>2003-03-04T16:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: /usr/lbin/ executables with suid bits</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918602#M752336</link>
      <description>Good question .. be it /usr/lbin, /usr/sbin or /usr/bin you would see some executables with SUID set the first time you install the OS. I can explain why .. in my own simple terms. Even though the executables have its suid set, most of the suid check is done within the compiled program. Meaning there may be certain functionality in the program that allow changes and even though suid is set at the file level, this does not mean the functions within the program adhere to the suid because it has the capability to use "setresuid" within it to perform further permission check. In other words, the suid you see does not mean the that everything or every functions in the executable inherits that.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Mar 2003 17:10:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918602#M752336</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2003-03-04T17:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: /usr/lbin/ executables with suid bits</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918603#M752337</link>
      <description>It is never a good idea to try to 'improve' security for system programs by removing suid bits. They are set for a lot of reasons and since they are executables, they do not fall into the category of suid scripts. Removing these bits from programs in /usr/lbin, /usr/sbin or /usr/bin will destroy the system. &lt;BR /&gt;&lt;BR /&gt;For instance, remove suid from login and no one can login. That's because you are nobody when login first starts, and once you have been authenticated, login has to have enough privileges to establish your session on your behalf. Similarly with mail tools which perform tasks in two worlds: system and user&lt;BR /&gt;&lt;BR /&gt;So unless you want a very big job fixing your system, leave the /usr/bin, /usr/sbin and /usr/lbin executables alone. Now it is a VERY different story for /tmp, /var/tmp and /home. Those are directories where you do NOT want any suid executables since users can create files there. It is advisable to mount /tmp, /var and /home with the nosuid option. That way, if someone tries to circumvent security, the script or executable will not be allowed to run.</description>
      <pubDate>Tue, 04 Mar 2003 20:42:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918603#M752337</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2003-03-04T20:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: /usr/lbin/ executables with suid bits</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918604#M752338</link>
      <description>Thanks all.&lt;BR /&gt;&lt;BR /&gt;We are going the leave the bits alone.&lt;BR /&gt;&lt;BR /&gt;I like to keep in mind the orailly statement on: ( thanks Jim) &lt;BR /&gt;exrecover&lt;BR /&gt;The recovery command for the ex editor, exrecover, has a buffer overflow. On many systems this program is unnecessarily suid root, opening up the possibility for a local root exploit. The problem is caused by not checking the length of the second argument.&lt;BR /&gt;&lt;BR /&gt;There is no reason for this program to be suid, so remove its suid bit and update it to the latest version&lt;BR /&gt;&lt;BR /&gt;This does not seem to be the case on HP_UX, is it?&lt;BR /&gt;&lt;BR /&gt;Gideon&lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Mar 2003 07:57:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/usr-lbin-executables-with-suid-bits/m-p/2918604#M752338</guid>
      <dc:creator>G. Vrijhoeven</dc:creator>
      <dc:date>2003-03-05T07:57:06Z</dc:date>
    </item>
  </channel>
</rss>

