Bug 32531
Summary: | startx allows anyone access to a user shell | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Greg P. Semeraro <semeraro> |
Component: | XFree86 | Assignee: | Mike A. Harris <mharris> |
Status: | CLOSED NOTABUG | QA Contact: | David Lawrence <dkl> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 7.0 | Keywords: | Security |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2001-03-22 14:24:23 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Greg P. Semeraro
2001-03-21 14:49:12 UTC
You can change this with the 'DontZap' parameter in your XF86Config or XF86Config-4. This problem is not yet resolved. I indicated two ways to gain access to a user's account one of which was to use ctrl-alt-backspace, that security hole is plugged by uncommenting DontZap in the XF86Config file. The other method is to switch to the virtual console that the user used to run startx (using ctrl-alt-F1, ctrl-alt-F2, etc) and then press ctrl-c. That hole still exists even with DontZap uncommented. No - there is NO security hole. A user with physical access to a machine can do a lot of things. If you do not want someone mucking with things then do not give them physical access. If one needs secure physical access, it does not exist period. If you want to stop someone from switching to a VC, then boot the system in runlevel 5 and disable all vc's completely. Again, I repeat - there is no security hole - this is a local site misconfiguration. Even when configured to boot in runlevel 5, with no VC's available, if a user has physical access to a machine, they can do all sorts of things to get access, and it is up to you to read up on security howto's and whatnot to reconfigure the box to be as secure as you need it to be including passwording the CMOS, passwording LILO and disabling floppy and CDROM boots. This is a bug report system however, not a security tutorial, so please read the Security documents in the /usr/share/doc/HOWTO directory if you want to set up a fairly secure machine. Again, do realize, and I stress this - ANY machine with physical access is insecure *period*. If you need help configuring secure access, please join our mailing lists. |