what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

FreeBSD-SA-02_24.k5su

FreeBSD-SA-02_24.k5su
Posted May 22, 2002
Authored by FreeBSD Security Officer Team | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:24.k5su - The k5su utility fails to limit super-user access to the 'wheel' group. This affects FreeBSD 4.4-RELEASE, 4.5-RELEASE and FreeBSD-STABLE (prior to 2002-05-15).

systems | freebsd
SHA-256 | cd2d905c9a1378b575c156931f665f64c3a4ddbdf627509dc912c87805cb8e7e

FreeBSD-SA-02_24.k5su

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

=============================================================================
FreeBSD-SA-02:24.k5su Security Advisory
The FreeBSD Project

Topic: k5su utility does not honor `wheel' group

Category: kerberos5
Module: kerberos5/usr.bin/k5su
Announced: 2002-05-20
Credits: jmallet@FreeBSD.org
Affects: FreeBSD 4.4-RELEASE
FreeBSD 4.5-RELEASE
FreeBSD-STABLE prior to the correction date
Corrected: 2002-05-15 12:51:30 UTC (RELENG_4)
2002-05-15 12:56:21 UTC (RELENG_4_5)
2002-05-15 13:04:00 UTC (RELENG_4_4)
FreeBSD only: YES

I. Background

The k5su utility is a SU utility similar to su(1), and is used to
switch privileges after authentication using Kerberos 5 or the local
passwd(5) file. k5su is installed as part of the `krb5' distribution,
or when building from source with MAKE_KERBEROS5 set. Neither of
these are default settings.

II. Problem Description

Historically, the BSD SU utility only allows users who are members
of group `wheel' (group-ID 0) to obtain superuser
privileges. The k5su utility, however, does not honor this convention
and does not verify group membership if a user has successfully
authenticated.

k5su also lacks other features of su(1), such as checking for
password expiration, implementing login classes, and checking
for the target user's login shell in /etc/shells.

III. Impact

Contrary to the expectations of many BSD system administrators, users
not in group `wheel' may use k5su to attempt to obtain superuser
privileges. Note that this would require knowledge of the root
account password, or an explicit entry in the Kerberos 5 `.k5login'
ACL for the root account.

IV. Solution

Remove the set-user-ID bit from the k5su utility:

# chmod u-s /usr/bin/k5su

This will completely disable k5su.

Sites which wish to use Kerberos 5 authentication for SU and are
comfortable with its limitations may choose to leave the set-user-ID
bit enabled. As of the correction date, FreeBSD (including the
upcoming 4.6-RELEASE) will install k5su if requested, but the
set-user-ID bit will not be enabled by default. See also the
ENABLE_SUID_K5SU option in make.conf(5).

VI. Correction details

The following list contains the revision numbers of each file that was
corrected in FreeBSD.

Path Revision
Branch
- -------------------------------------------------------------------------
src/UPDATING
RELENG_4 1.73.2.67
RELENG_4_5 1.73.2.50.2.12
RELENG_4_4 1.73.2.43.2.12
src/etc/defaults/make.conf
RELENG_4 1.97.2.65
RELENG_4_5 1.97.2.59.2.1
RELENG_4_4 1.97.2.58.2.1
src/kerberos5/usr.bin/k5su/Makefile
RELENG_4 1.73.2.67
RELENG_4_5 1.97.2.59.2.1
RELENG_4_4 1.1.2.2.2.1
src/share/man/man5/make.conf.5
RELENG_4 1.12.2.16
RELENG_4_5 1.12.2.12.2.1
RELENG_4_4 1.12.2.10.2.1
- -------------------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (FreeBSD)
Comment: FreeBSD: The Power To Serve

iQCVAwUBPOkdtFUuHi5z0oilAQFd1wP8CUxrBx+DJhQZqLpOocpF4yd8IWclz4Uu
8I8LT5RaWNKMrOt9FB6/jGthRFNqTL72XeDaezxT72IFSUHIpF9wI87aKNVDknPp
vQxh0Pr8/8EqvOLhvT6Hu/20xKrBZe2bht/lUQ/HxrgriaZteTAMfMYL653xgP5U
M+0f/mfSm3w=
=lTOo
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close