- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- /usr/lbin/ executables with suid bits
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-04-2003 07:52 AM
03-04-2003 07:52 AM
/usr/lbin/ executables with suid bits
In /usr/lbin you can find a the executables
/usr/lbin/chgpt
/usr/lbin/exrecover
/usr/lbin/protect_pty
The owner is root and the executables have a suid bit set on. I can not find any man page on the executables. Can S.O. tell me what the executables do and what the consequenses will be if the suid bits are be removed.
Thanks in advance,
Gideon
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-04-2003 07:57 AM
03-04-2003 07:57 AM
Re: /usr/lbin/ executables with suid bits
If you have an 11.11 system there will be man pages for some of the things there (modprpw and getprpw come to mind).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-04-2003 07:59 AM
03-04-2003 07:59 AM
Re: /usr/lbin/ executables with suid bits
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-04-2003 08:15 AM
03-04-2003 08:15 AM
Re: /usr/lbin/ executables with suid bits
Patrick:
We have a policy that only the root user can use SAM. So if SAM is the only "script" that uses these executables the bit is not nessesary. My problem is that i have no idea what the reason is for the suid bit.
S.K.
Some commands in /usr/bin have suid bits of there own. Why these bits?
Gideon
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-04-2003 08:25 AM
03-04-2003 08:25 AM
Re: /usr/lbin/ executables with suid bits
http://www.ornl.gov/cts/archives/mailing-lists/tru64-unix-managers/2002/09/msg00187.html
An internet search also turned up references to an overflow buffer bug in the Solaris /usr/lib/exrecover binary.
http://www.iss.net/security_center/static/5913.php
and a possible explanation of its function:
http://linux.oreillynet.com/pub/a/linux/2001/01/15/insecurities.html
http://www.lbl.gov/ITSD/CIS/faqs/UNIX_Faq/15.html
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-04-2003 08:42 AM
03-04-2003 08:42 AM
Re: /usr/lbin/ executables with suid bits
All the ones in /usr/lbin have write access to nobody so are not a problem.
The reason for suid programs...
Consider the passwd command, it has to write to /etc/passwd, /etc/passwd has permissions -r--r--r-- so can only by written to by root. The root suid program 'passwd' runs with an effective uid of root so can write to /etc/passwd.
Personally I'd leave the programs in /usr/lbin alone...
Regards,
John
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-04-2003 09:10 AM
03-04-2003 09:10 AM
Re: /usr/lbin/ executables with suid bits
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-04-2003 12:42 PM
03-04-2003 12:42 PM
Re: /usr/lbin/ executables with suid bits
For instance, remove suid from login and no one can login. That's because you are nobody when login first starts, and once you have been authenticated, login has to have enough privileges to establish your session on your behalf. Similarly with mail tools which perform tasks in two worlds: system and user
So unless you want a very big job fixing your system, leave the /usr/bin, /usr/sbin and /usr/lbin executables alone. Now it is a VERY different story for /tmp, /var/tmp and /home. Those are directories where you do NOT want any suid executables since users can create files there. It is advisable to mount /tmp, /var and /home with the nosuid option. That way, if someone tries to circumvent security, the script or executable will not be allowed to run.
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-04-2003 11:57 PM
03-04-2003 11:57 PM
Re: /usr/lbin/ executables with suid bits
We are going the leave the bits alone.
I like to keep in mind the orailly statement on: ( thanks Jim)
exrecover
The recovery command for the ex editor, exrecover, has a buffer overflow. On many systems this program is unnecessarily suid root, opening up the possibility for a local root exploit. The problem is caused by not checking the length of the second argument.
There is no reason for this program to be suid, so remove its suid bit and update it to the latest version
This does not seem to be the case on HP_UX, is it?
Gideon