Re: ktorrent vulnerable?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 23 Jul 2012 03:50:59 +0530, A. Mani wrote:

> > Did the user run ktorrent as "root"?
> 
> No

As a quick thought, then it would need another vulnerability outside
ktorrent to elevate user privileges. Plus the corresponding exploit.

> encryption, scripts were enabled in ktorrent.
> 
> > Also, did you keep a copy of the full "stat /usr" output? If not, why not?
> >
> 
> (I did not have enough time to check much)

Uh, come on. You would use "stat" instead of "ls".
ls -idZ output is not helpful.

> modify to /usr was on 19th July  3:00 hrs ( +5:30)
> change was same
> Access was 2 hours later.
> 
> ls -idZ output looked like
> 
> drwxrwxrwx. root root system_u:object_r:bin_t:s0       /usr/bin
> drwxrwxrwx. root root system_u:object_r:usr_t:s0       /usr/
> drwxrwxrwx. root root system_u:object_r:usr_t:s0       /usr/share
> dr-xr-xr-x. root root system_u:object_r:bin_t:s0       /usr/sbin
> lrwxrwxrwx. root root system_u:object_r:bin_t:s0       /sbin -> usr/sbin

That's more strange than suspicious.

It's kind of stupid to touch multiple dirs, when it's entirely sufficient
to modify a single one. You can make /usr/bin world-writable and store
files in it without making /usr world-writable. And if /usr is made
world-writable, you could create subdirs in it with no need to consider
/usr/share.

I've seen file permissions like that as a result of accidents when playing
with chmod or bad "make install" scripts.

> But /var was not writable by user.

And /usr/sbin (and likely others) not either.

Have you searched for any modified or hidden files yet?
-- 
test mailing list
test@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test



[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]

  Powered by Linux