08-08-2009
You probably have a typo in the command you are really running. The above command worked okay for me on Solaris 9 running against the /usr tree as a non-priv user.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have a C wrapper programme which basically execute a shell script. The shell script has 700 as permission and oracle is owner of the shell script.
The C execuatble has 4711 permission so that means that it has setuid bit set and group and others can execute the C executable.
The reason why I am... (2 Replies)
Discussion started by: sanjay92
2 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I have been looking at setuid and setgid.
I understand that setuid determines who owns the file and setgid determines which group of people can access the file... yeah?!
But i need to know how to actually use setuid and setgid. I'm guessing chmod will feature somewhere..
Any help... (1 Reply)
Discussion started by: crispy
1 Replies
3. Shell Programming and Scripting
About System and Perl: Sun Solaris 5.9 sparc, Perl 5.6.1
I've decided to use the perl file::find module to look for all the SETUID and SETGID files on my unix boxes. I wrote something like this: (I've shorted it a little to make it simple)
#!/opt/perl/bin/perl
use File::Find;
find... (1 Reply)
Discussion started by: x96riley3
1 Replies
4. UNIX for Dummies Questions & Answers
could u plz give me clear idea of spcial permissions setuid,getuid and striky bit . (1 Reply)
Discussion started by: Prem
1 Replies
5. HP-UX
for security issue ,i would like to find all privilege tools that can setuid
how to do this (2 Replies)
Discussion started by: alert0919
2 Replies
6. Solaris
Hi All,
Can someone give me some info about setuid or guid topic? Also about sticky bit.
Thanks in advance,
itik (9 Replies)
Discussion started by: itik
9 Replies
7. HP-UX
Hi All,
How to prevent root user from doing setuid().
In otherwords, if the root(any user) is trying to do setuid in a program it should fail. (5 Replies)
Discussion started by: guru13
5 Replies
8. Solaris
Hi Gurus,
I need your suggestions,to implement setuid.
Here is the situation. I have a user xyz on a solaris zone.He needs to install a package using a pkgadd command but i guess only a root can run that .Is there any way I can set the setuid bit on the pkgadd which is in the location... (6 Replies)
Discussion started by: rama krishna
6 Replies
9. UNIX for Beginners Questions & Answers
Just learning about the privilege escalation method provided by setuid. Correct me if I am wrong but what it does is change the uid of the current process to whatever uid I set. Right ?
So what stops me from writing my own C program and calling setuid(0) within it and gaining root privileges ?
... (2 Replies)
Discussion started by: sreyan32
2 Replies
10. Shell Programming and Scripting
I'm trying - as an ordinary user - to create a file in the root directory of my system. For that purpose I wrote a simple script that echoes a string into a file. I made the file executable, used sudo to change ownership to root. Like this:
$ cat hello
#!/bin/bash
echo hello > /hello
$... (5 Replies)
Discussion started by: Ralph
5 Replies
LEARN ABOUT DEBIAN
chrootuid
CHROOTUID(1) General Commands Manual CHROOTUID(1)
NAME
chrootuid - run command in restricted environment
SYNOPSIS
chrootuid [-i] newroot newuser command...
DESCRIPTION
The chrootuid command sets up a restricted environment for executing command. Access to the file system is restricted to the newroot sub-
tree; privileges are restricted to those of the newuser account (which must be a known account in the unrestricted environment). The ini-
tial working directory is changed to newroot.
chrootuid combines chroot(8) and su(1) into one program, so that there is no need to have commands such as /usr/bin/su in the restricted
environment.
Only the superuser can use the chrootuid command.
OPTIONS
There is only one option for chrootuid: -i. That option makes it run in interactive mode. Errors will be printed on stderr instead of
through syslog and the exit status will be 1 if there are any errors.
RETURN CODES
The exit status of chrootuid when running on daemon mode (default) is always 0.
If it is running on interactive mode, it will exit with an exit status of 1 if there is any error in its invocation, otherwise the exit
status is the exit status of command.
DIAGNOSTICS
Problems are reported to the syslog daemon if running on daemon mode. If running on interactive mode, errors are reported on stderr.
SEE ALSO
chroot(8), su(1)
AUTHOR(S)
Wietse Venema
Eindhoven University of Technology
Department of Mathematics and Computer Science
Den Dolech 2, P.O. Box 513, 5600 MB Eindhoven, The Netherlands
IBM T.J. Watson Research
P.O. Box 704
Yorktown Heights, NY 10598, USA
CREATION DATE
Tue Oct 13 11:37:29 MET 1992
LAST MODIFICATION
Mon May 20 22:49:02 CEST 2007
VERSION
/RELEASE
1.3
CHROOTUID(1)