Ubuntu security hole? (not super major, but wondering if it is anissue to report)
towsonu2003
ulist at gs1.ubuntuforums.org
Tue May 9 13:51:03 UTC 2006
Chanchao Wrote:
>
> HOWEVER, at this point it put me straight into a root shell!
> 'root at ubuntu #' So it did not prompt for a root password (obviously,
> as there is none) but it also did not prompt for my own password.
did you file a bug report?
Cybe R. Wizard Wrote:
> On Tue, 09 May 2006 11:04:18 +0700
> Chanchao <custom (AT) freenet (DOT) de> wrote:
>
> > HOWEVER, at this point it put me straight into a root shell!
> > 'root at ubuntu #' So it did not prompt for a root password
> (obviously,
> > as there is none) but it also did not prompt for my own password. Of
> > course it wouldn't know which username in the sudoers list to pick
> (in
> > my case there's only one), but the result was that the system opened
> > itself up with complete root access to whoever was sitting at the
> > keyboard.
>
> As ever, if a black hat has physical access to the machine all
> security
> bets are off.
>
I hear this argument everytime a local user privilege escalation bug is
catched... I heard this even when the plaintext password bug was
discovered in Ubuntu.
Dick Davies Wrote:
>
> The case we're talking about here is when the machine has major
> problems and can't mount it's disks. It's not on the network and isn't
> going to be without some help.
>
> I don't think that's the time to throw obstacles in the way of a user
> who's trying to fix things, just to gain a false sense of security.
>
Windows did it *ducks* as it removes the obstacles in the way of the
"user"...
I don't see anything wrong with assuming that any local or remote users
may be malicious (use the privilege escalation) or stupid (use rm after
privilege escalation).
--
towsonu2003
More information about the ubuntu-users
mailing list