Hi,
I am writing some bourne shell and perl tools that will run on a sun3 and
sun4 running SunOS 4.1.1. The tools need to be setuid, so I am wrapping the
files in a C binary that is setuid and calls them. (The wrap generator is
"setuidscript" in the perl "camel" book on page 305.)
What I would like to know is: How secure will these scripts be and are there
any obvious holes that would be good to know about?
The C wrapper calls out the script by it's exact path, so there is no chance
of the user's path being a problem. The executables are owned by a special
user that is not root. The scripts call emacs or vi, but both editors appear
to refuse a csh shell from starting.
I plan on converting these to regular old C is there is a significant reason
for doing so. Hence, this posting.
All replies, war stories, etc. will be greatly appreciated. Please reply via
email if possible and I will summarize.
thanks and have a good day,
-fjs