| Summary: | permissions on /usr/bin/opiepasswd | ||
|---|---|---|---|
| Product: | Base System | Reporter: | rene <rene> |
| Component: | bin | Assignee: | Kris Kennaway <kris> |
| Status: | Closed FIXED | ||
| Severity: | Affects Only Me | ||
| Priority: | Normal | ||
| Version: | 4.1-STABLE | ||
| Hardware: | Any | ||
| OS: | Any | ||
|
Description
rene
2000-09-02 21:10:01 UTC
Responsible Changed From-To: freebsd-bugs->kris Over to maintainer. On Mon, 4 Sep 2000 sheldonh@FreeBSD.org wrote: > Synopsis: permissions on /usr/bin/opiepasswd Thanks - I've known about this for some time, but wanted to do a source code audit of opiepasswd before giving it the setuid bit. I'll try and get to it soon. Kris -- In God we Trust -- all others must submit an X.509 certificate. -- Charles Forsythe <forsythe@alum.mit.edu> http://www.w00w00.org/advisories/skey.html When opiepasswd(1) is used, the libopie function opieopen() is called. The two functions which call opieopen are opiereadrec() and opiewriterec(). Both functions call opieopen and specify a mode of 644. If the /etc/opiekeys database is not present, a file is created with this mode, resulting in a world-readable file. State Changed From-To: open->closed Fixed in rev 1.4.2.2 of usr.bin/opiepasswd/Makefile by des |