IRIX disk_bandwidth Vulnerability

Solution:
SGI recommends changing the permissions of the disk_bandwidth program to allow execution only by system administrators. Removing the setuid bit, and restricting the file permissions to allow only for execution by root, or those in a specific group will eliminate this vulnerability, so long as these users do not have '.' as the first element in their path; this would allow an attacker to possibly still perform the attack, by waiting for the administrator to execute the program in a specific directory.

# chmod 500 /sbin/disk_bandwidth



 

Privacy Statement
Copyright 2010, SecurityFocus