09-20-2015
Hi,
What does "a.out" doing ?
It try to launch bash in setuid root ?
You shall know that bash not work by default in setuid root, you must use "-p" option.
In man:
Quote:
If the shell is started with the effective user (group) id not equal to the real user (group) id, and the -p option is not
supplied, no startup files are read, shell functions are not inherited from the environment, the SHELLOPTS, BASHOPTS, CDPATH,
and GLOBIGNORE variables, if they appear in the environment, are ignored, and the effective user id is set to the real user
id. If the -p option is supplied at invocation, the startup behavior is the same, but the effective user id is not reset.
Regards.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
what is SUID ? can someone explain or point me to a link ?
thanks
simon2000 (2 Replies)
Discussion started by: simon2000
2 Replies
2. UNIX for Advanced & Expert Users
Hi,
I have two file in my directory. "catter" file contains "cat ./file". And "file" contails "Hi ashish". I have SUID bit set for catter file. But when a different user in my group runs file catter, shell displays "Permission denied" message.
I just want to know can use of suid bit be... (3 Replies)
Discussion started by: shriashishpatil
3 Replies
3. UNIX for Advanced & Expert Users
Hi
Senario: I have previleges to edit a file F but User B does not have sufficient privs to edit it.
In order for B to edit it I tried an indirect way. I created a script to edit F and SUID this script so that B can execute it with the privs of me. But this is not working . can some one help... (3 Replies)
Discussion started by: Pankaj Mishra
3 Replies
4. UNIX for Advanced & Expert Users
Hello,
I would like to run gedit as root while logged into my regular user account. When I try to launch gedit from the command line as super user, I get this message:
Gtk-WARNING **: cannot open display:
Any suggestions or word arounds? It would make my life a lot simpler to edit files... (8 Replies)
Discussion started by: Allasso
8 Replies
5. UNIX for Dummies Questions & Answers
Are the programs written on schedulers ,thread library , process management, memory management, et al called systems programs ? How are they different from the programs that implement functions like open() , printf() , scanf() , read() .. they have a prefix sys_open, sys_close, sys_read etc , right... (1 Reply)
Discussion started by: vishwamitra
1 Replies
6. UNIX for Advanced & Expert Users
How do check the programs that the actual user of the computer installed. I do not care at all about the default programs that came with your distro of Linux, I only want the user installed programs. (1 Reply)
Discussion started by: cokedude
1 Replies
7. Cybersecurity
Hello
My system is Debian-503-amd64. After I installed the "lpr" package, I found that some files with SUID bit come from this package. As:
ls -l /usr/bin/lp*
....
-rwsr-sr-x 1 root lp 31800 2008-05-20 /usr/bin/lpq
-rwsr-sr-x 1 root lp 28504 2008-05-20 /usr/bin/lpr
-rwsr-sr-x 1... (1 Reply)
Discussion started by: ZR_Lang
1 Replies
8. Debian
want to create a user account for each of the key programs installed on my debian server. For example, for the following programs:
Tomcat Nginx Supervisor PostgreSQL
This seems to be recommended based on my reading online. However, I want to restrict these user accounts as much as possible,... (3 Replies)
Discussion started by: Spadez
3 Replies
9. Shell Programming and Scripting
SUID works for shell scripts (bash)??
I'm user user1 need to execute a shell script (script.sh) which is owned by user2.-rwsrwxrwx 1 user2 aduser 3518 Aug 21 05:33 script.shOnly user2 has write privileges to write/copy a file in directory /dir1/subdir. Hence SUID bit permissions are set to... (8 Replies)
Discussion started by: MSK_1990
8 Replies
10. UNIX for Dummies Questions & Answers
I had a question in my test which asked where suppose user B has a program with 's' bit set. Can user A run this program and gain root privileges in any way?
I suppose not as the suid program run with privileges of owner and this program will run with B's privileges and not root. (1 Reply)
Discussion started by: syncmaster
1 Replies
SXID(1) General Commands Manual SXID(1)
NAME
sxid - check for changes in s[ug]id files and directories
SYNOPSIS
sxid [ --config <file> ] [ --nomail ] [ --spotcheck ] [ --listall ]
DESCRIPTION
Sxid checks for changes in suid and sgid files and directories based on its last check. Logs are stored by default in /var/log/sxid.log.
The changes are then emailed to the address specified in the configuration file. The default location for the config file is /etc/sxid.conf
but this can be overridden with the --config option and specifying an alternate location.
OUTPUT
The program outputs several different checks concerning the current status of the suid and sgid files and directories on the system on
which it was run. This is a basic overview of the format.
In the add remove section, new files are preceded by a '+', old ones are preceded by a '-' NOTE: that removed does not mean gone from the
filesystem, just that it is no longer sgid or suid.
Most of it is pretty easy to understand. On the sections that show changes in the file's info (uid, gid, modes...) the format is old->new.
So if the old owner was 'mail' and it is now 'root' then it shows it as mail->root.
The list of files in the checks is in the following format:
/full/path *user.group MODE
(MODE is the 4 digit mode, as in 4755)
In the changes section, if the line is preceded by an 'i' then that item has changed inodes since the last check (regardless of any s[ug]id
change), if there is an 'm' then the md5sum has changed.
If a user or group entry is preceded by a '*' then it's execution bit is set (ie. *root.wheel is suid, root.*wheel is sgid, *root.*wheel is
+s).
On the forbidden directories, if ENFORCE is enabled an 'r' will precede forbidden items that were succesfully -s'd, and an '!' will show
that it was unsuccesfully -s'd (for what ever reason).
OPTIONS
-c, --config <file>
specifies an alternate configuration file
-n, --nomail
sends output to stdout instead of emailing, useful for spot checks
-k, --spotcheck
Checks for changes by recursing the current working directory. Log files will not be rotated and no email sent. All output will go
to stdout.
-l, --listall
Useful when doing --spotcheck or --nomail to list all files that are logged, regardless of changes.
AUTHOR
Ben Collins <bcollins@debian.org>
REPORTING BUGS
Report bugs to current maintainer Timur Birsh <taem@linukz.org>.
SEE ALSO
sxid.conf(5)
sXid 4.0.5 January 2002 SXID(1)