I understand that setUID bit works with the EUID and RUID in Linux to give non-provisioned users temporary root access to executables that require it. However, my main concern is that let's say a process is malicious on a computer. Even if the process has a low-privileged User-ID (like "nobody" on Macs), if all they can do to execute code is work with files that have the setUID bit to get a temporary root EUID, wouldn't that defeat the whole purpose of having privileged processes, as that process now technically has root access to the computer? Or am I missing something? Thanks!
Security Concerns on SetUID for non-privileged, malicious process (Linux)
969 Views Asked by Justin Tjoa At
1
There are 1 best solutions below
Related Questions in LINUX
- Is there some way to use printf to print a horizontal list of decrementing hex digits in NASM assembly on Linux
- Why does Hugo generate different taxonomy-related HTML on different OS's?
- Writes in io_uring do not advance the file offset
- Why `set -o pipefail` gives different output even though the pipe is not failing
- what really controls the permissions: UID or eUID?
- Compiling eBPF program in Docker fails due to missing '__u64' type
- Docker container unable to make HTTPS requests to external API
- Whow to use callback_query_handler in Python 3.10
- Create kea runtime directory at startup in Yocto image
- Problem on CPU scheduling algorithms in OS
- How to copy files into the singularity sandbox?
- Android kernel error: undefined reference to `get_hw_version_platform'
- Is there a need for BPF Linux namespace?
- Error when trying to execute a binary compiled in a Kali Linux machine on an Ubuntu system
- Issue with launching application after updating ElectronJs to version 28.0.0 on Windows and Linux
Related Questions in SECURITY
- HTTPS configuration in Spring Boot, server returning timeout
- HSM ZKA control mask values
- OWASP Amass Subcommands
- Is there a need for BPF Linux namespace?
- Error when trying to execute a binary compiled in a Kali Linux machine on an Ubuntu system
- When sanitize/encode while implementing tags system like on SO
- spring security version in spring-boot-starter-security
- I am currently trying to implement a rudimentary firewall from a video I watched but the nimda worm detection is not working and i do not know why?
- Is it possible for `sudo` to fail temporarily with the correct password? Hacking suspected
- Is it viable proxying all my mobile apps requests, to some kind knowing that a request is coming from a secure source
- What abilities should I concentrate on while bug hunting, and how can I improve the quality of my bug bounty reports?
- System.ArgumentOutOfRangeException: I passed this error in every single program
- How to prevent users from creating custom client apps?
- Does server-side content security policy exist for youtube video player API, app, mod apks and website?
- Can we pass a hostname/IP address as a query string in a GET request in REST API
Related Questions in PROCESS
- How to get Java running parameters from Spring Boot running inside container in pod where no ps exist
- Module not found: Error: Can't resolve 'child_process' in 'react-cerbos-demo/node_modules/cerbos'
- Launch URL from C# and detect when browser is closed
- Communicating Java and Python processes freeze after a while when using readline() but not input()
- Can someone tell me what's wrong with mi Task.await?
- Initial Fastapi request is not being processed and stays on hold
- running the ld command through rust only works 50% of the time
- Dropping duplicated rows
- Which child will execute first when you call fork() and wait() multiple times?
- How to kill number of processes in cpanel
- How is Unix signal propagated to PGID in namespaces and what is the impact of NSpgid on process signal handling?
- Why does sudo kill -15 on sh and docker-compose PIDs not stop Docker containers?
- Can Process.Exited event get fired but the process hang in the system?
- Powershell script can not run when invoke in .NET process
- How to quickly terminate child processes in Go and proceed only when killed
Related Questions in SETUID
- Lowering privileges of executed script
- Why the setuid program does not have the privilege to execute system()
- How can I elevate the privileges of an executable using setuid on Mac?
- How to prevent unextracable docker images because of insuffcient UID range?
- setgid/setuid has no effect on compiled golang code 1.19
- Why is /proc/self/fd/N forbidden after setuid?
- How do I use setuid in Python?
- Not understanding setuid
- How to jump between users, including root, in a perlscript?
- Is there a way to run seteuid() (as a non-root user) and temporarily change the euid to another non-root user without root/sudo privileges?
- Launch child process as root (python, setuid, MacOS)
- C cannot endors another user permissions using setresuid
- Why the set-uid operation can't be used in an excutable file?
- sh: 1: : not found when trying to open a new shell
- Problems with readlink and set uid
Related Questions in MULTIPLE-USERS
- Mailmerge Word used by different users
- Google sheet created by other user can't be found by apps script
- How to persist users in Grafana open source (docker swarm)
- Install Extension of Python in Visual studio Code in Server 2022
- Get list all Users from Azure AD
- Is there a strategy for multiple user and parallel computing
- Specific user access to branches in one repository of GitHub
- Powershell change format of csv file
- How to automatically move different excel files from one folder to multiple folders using SharePoint
- Getting count of users sign-in, in AWS Pinpoint
- Django Multiple User type and extra fields
- Angular: unique service for sharing data between users (not components!)
- i want each email to log in with one device
- how to run 2000 users in jmeter while i am having 20 users in my csv file?
- How to execute login to web application with multiple users using Nbomber
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular # Hahtags
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
Just because an executable has privileged access doesn't mean the person who executes it can cause it to do arbitrary actions.
Programs that are intended to be run under setuid must be written very carefully to avoid being used in unintended privilege-escalating ways. If they have security flaws, yes, it will create exactly the problem you describe, and you must be very careful before applying the setuid flag to executables.