5158147 2000-06-04  03:41  /42 rader/ Postmaster
Mottagare: Bugtraq (import) <11137>
Ärende: bind running as root in Mandrake 7.0
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: BUGTRAQ@SECURITYFOCUS.COM
X-Sender: nico@linuxserver.it-xchange.com
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.LNX.4.21.0006031555490.8877-100000@linuxserver.it-xchange.com>
Date:         Sat, 3 Jun 2000 16:03:51 +0200
Reply-To: Nicolas MONNET <nico@MONNET.TO>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Nicolas MONNET <nico@MONNET.TO>
To: BUGTRAQ@SECURITYFOCUS.COM

bind is run as user / group 'root' in Mandrake 7.0, and probably in
Redhat6.x as well. This is a surprising (if not stupid) setting given
the fact that sploits exist that easily break out of any chroot jail
in such a case; and that switching users is as easy as adding an
option to named. Esp. given the infuriatingly poor security track
record of named ...

Indeed, here's a simple patch against /etc/rc.d/init.d/named that I
strongly suggest applying. It does'nt seem to cause any problem for
me.

*** named.orig	Sat Jun  3 15:55:00 2000
--- named	Fri Jun  2 22:04:10 2000
***************
*** 28,34 ****
    start)
          # Start daemons.
          echo -n "Starting named: "
!         daemon named
  	RETVAL=$?
   	[ $RETVAL -eq 0 ] && touch /var/lock/subsys/named
  	echo
--- 28,34 ----
    start)
          # Start daemons.
          echo -n "Starting named: "
!         daemon named -u nobody -g nogroup
  	RETVAL=$?
   	[ $RETVAL -eq 0 ] && touch /var/lock/subsys/named
  	echo
(5158147) ------------------------------------------(Ombruten)

5161557 2000-06-05  03:11  /35 rader/ Postmaster
Mottagare: Bugtraq (import) <11144>
Ärende: Re: bind running as root in Mandrake 7.0
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: BUGTRAQ@SECURITYFOCUS.COM
X-Accept-Language: en, ja
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID:  <3939B689.54DA9229@mindspring.com>
Date:         Sat, 3 Jun 2000 20:53:13 -0500
Reply-To: Brock Sides <philarete@MINDSPRING.COM>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Brock Sides <philarete@MINDSPRING.COM>
X-To:         Nicolas MONNET <nico@MONNET.TO>
To: BUGTRAQ@SECURITYFOCUS.COM

Nicolas MONNET wrote:

> bind is run as user / group 'root' in Mandrake 7.0, and probably in
> Redhat6.x as well. This is a surprising (if not stupid) setting given the
> fact that sploits exist that easily break out of any chroot jail in such a
> case; and that switching users is as easy as adding an option to
> named. Esp. given the infuriatingly poor security track record of named
> ...
>
> Indeed, here's a simple patch against /etc/rc.d/init.d/named that I
> strongly suggest applying. It does'nt seem to cause any problem for me.

RedHat 6.2 runs BIND as user/group "named", IIRC.

Your patch will break things if you're running a slave nameserver,
unless you also chown /var/named (or wherever you're keeping your
automatically generated zone files) to the user you're running named
as.

Brock Sides
philarete@mindspring.com
(5161557) ------------------------------------------(Ombruten)

5161825 2000-06-05  05:01  /71 rader/ Postmaster
Mottagare: Bugtraq (import) <11160>
Ärende: Linux-Mandrake bind update.
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: BUGTRAQ@SECURITYFOCUS.COM
User-Agent: Gnus/5.0807 (Gnus v5.8.7) Emacs/20.6
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Message-ID:  <m2ya4l4eed.fsf@vador.mandrakesoft.com>
Date:         Sun, 4 Jun 2000 18:08:58 +0200
Reply-To: Chmouel Boudjnah <chmouel@MANDRAKESOFT.COM>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Chmouel Boudjnah <chmouel@MANDRAKESOFT.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

-------------------------------------

   Linux-Mandrake Security Update

-------------------------------------

Package: bind

Affected versions: 6.1 7.0

Problem: By default bind is launched as user and group root. This
setting can give the possibility to easily exploit vulnerabities in
bind. Thanks to Nicolas MONNET <nico at MONNET.TO> for his
contribution.

Please upgrade to:

md5sum: 185c51a554cd1c2fedf42f002ba8f01f
package: 6.1/RPMS/bind-8.2.2P5-6mdk.i586.rpm

md5sum: 39757dd3b1157685a486fc2c7afe2855
package:6.1/RPMS/bind-devel-8.2.2P5-6mdk.i586.rpm

md5sum: 507e45161ec6f9cbfb17dcf06d0831f0
package:6.1/RPMS/bind-utils-8.2.2P5-6mdk.i586.rpm

md5sum: eeffc6a7d2c7813931a2bbcb8da05a79
source: 6.1/SRPMS/bind-8.2.2P5-6mdk.src.rpm

md5sum: 95ccd87693c8e3c870f1bccd2842489b
package:7.0/RPMS/bind-8.2.2P5-6mdk.i586.rpm

md5sum: 31a1b33c3cf2013ea14ac1d0432a2785
package:7.0/RPMS/bind-devel-8.2.2P5-6mdk.i586.rpm

md5sum: ce92d5be31c4675e5ec21e4a76815633
package:7.0/RPMS/bind-utils-8.2.2P5-6mdk.i586.rpm

md5sum: eeffc6a7d2c7813931a2bbcb8da05a79
source: 7.0/SRPMS/bind-8.2.2P5-6mdk.src.rpm

To upgrade automatically, use « MandrakeUpdate ». If you want to
upgrade manually, download the updated package from one of our FTP
server mirrors and uprade with "rpm -Uvh package_name". All mirrors
are listed on http://www.mandrake.com/en/ftp.php3 Updated packages are
available in the "updates/" directory.

For example, if you are looking for an updated RPM package for
Mandrake 7.0, look for it in: updates/7.0/RPMS/

Note: we give the md5 sum for each package. It lets you check the
integrity of the downloaded package by running the md5sum command on
the package ("md5sum package.rpm").

--
MandrakeSoft Inc                http://www.mandrakesoft.com
In travel.                                        --Chmouel
(5161825) ------------------------------------------
Kommentar i text 5161829