BugTraq
Sudo tricks Mar 22 2006 10:40PM
John Richard Moser (nigelenki comcast net) (2 replies)
Re: Sudo tricks Mar 28 2006 01:27PM
Krzysztof Halasa (khc pm waw pl) (1 replies)
RE: Sudo tricks Mar 29 2006 05:46PM
Burton Strauss (Security SmallNetSolutions com)
Isn't the real meat of this issue the commands an unprivileged user is
permitted to execute via sudo?

Sudo isn't a blanket 'execute anything' unless it's set up that way.
Instead, you should carefully choose the specific command(s) that the user
needs to be allowed to execute. That should involve execution from an
absolute path and a protected binary.

For example, if visudo contains this

/sbin/ifconfig eth0

Then all the user can execute is the ifconfig command from the protected
binary in /sbin/ifconfig to see the state of the interface.

Or this

/sbin/ifconfig eth0 *

Allows him/her full control of eth0 - but still from the protected binary in
/sbin/ifconfig.

If you specify this:

ifconfig eth0 *

Then all bets are off...

-----Burton

[ reply ]
Re: Sudo tricks Mar 24 2006 07:05PM
Dave Korn (davek_throwaway hotmail com) (2 replies)
Re: Sudo tricks Mar 27 2006 08:29PM
Thomas M. Payerle (payerle physics umd edu)
Re: Sudo tricks Mar 26 2006 03:25AM
Kyle Wheeler (kyle-bugtraq memoryhole net)


 

Privacy Statement
Copyright 2010, SecurityFocus