POV-Ray : Newsgroups : povray.unix : Linux POV-Ray security warning : Linux POV-Ray security warning Server Time
28 Jul 2024 18:15:30 EDT (-0400)
  Linux POV-Ray security warning  
From: Mark Gordon
Date: 22 Nov 1999 02:13:26
Message: <3838ECE7.A6C5EC8D@mailbag.com>
s-povray has some buffer overflow bugs.  This is especially problematic
as it needs to be run by or as root (this is a limitation of svgalib). 
The previous install script and the makefile's install target made this
program suid root.  This opens up potential security holes which someone
might be able to use to gain root access.  For the time being, I'm
recommending people change it so that it can only be run by root. 
Instructions are as follows:

The diagnosis:
Run the following as root:
find / \(-perm -004000 -name s-povray \) -print
If it finds any, you might want to fix them.

The fix:
Run the following as root:
chmod 0755 /usr/local/bin/s-povray
(modify the path if it was installed elsewhere)

There's a new povlinux.tgz and povuni_s.tgz available for download that
no longer installs s-povray suid.  At this point, I'm not going to
promise a fix to the buffer overflows before 3.5.  I have not been able
to exploit the buffer overflow bugs, but that's not exactly my area of
expertise, so that doesn't mean much.  In case anyone is wondering, the
shell-out functionality doesn't appear to open any gaping holes, even if
s-povray is running as root.

-Mark Gordon


Post a reply to this message

Copyright 2003-2023 Persistence of Vision Raytracer Pty. Ltd.