X-Spam-Check-By: sourceware.org
Message-ID: <cb51e2e0601262102l35e39bbag892c8ed34feabd97@mail.gmail.com>
Date: Thu, 26 Jan 2006 21:02:45 -0800
From: Joshua Daniel Franklin <joshuadfranklin@gmail.com>
To: cygwin@cygwin.com
Subject: Re: multi user environment security due shared memory
In-Reply-To: <20051202130349.GR2999@calimero.vinschen.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Disposition: inline
References: <4390418A.4080000@adnovum.ch> 	 <20051202130349.GR2999@calimero.vinschen.de>
X-IsSubscribed: yes
Mailing-List: contact cygwin-help@cygwin.com; run by ezmlm
Precedence: bulk
List-Unsubscribe: <mailto:cygwin-unsubscribe-archive-cygwin=delorie.com@cygwin.com>
List-Subscribe: <mailto:cygwin-subscribe@cygwin.com>
List-Archive: <http://sourceware.org/ml/cygwin/>
List-Post: <mailto:cygwin@cygwin.com>
List-Help: <mailto:cygwin-help@cygwin.com>, <http://sourceware.org/ml/#faqs>
Sender: cygwin-owner@cygwin.com
Mail-Followup-To: cygwin@cygwin.com
Delivered-To: mailing list cygwin@cygwin.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by delorie.com id k0R536HE026789

On 12/2/05, Corinna Vinschen wrote:
> On Dec  2 13:43, andrea wrote:
> > What is the current status of the following security threats and how
> > would you rate security when running sshd in a multi user environment.
> >
> >  -Code execution in the context of an other user
> >  -Denial of service by overwriting the shared memory segments
> >   of cygwin
> >  -Data disclosure about processes of an other user by reading
> >   shared memory segments
> >  -Other security issues
>
> We're not aware of security implications, but we don't give any
> guarantee either and there's no such thing as a security survey
> for Cygwin.  If that's not sufficient for your company, feel
> free to contact Red Hat for a support contract which could cover
> are more detailed analysis, http://www.redhat.com/software/cygwin/
>

This is a little old, but I've updated
http://cygwin.com/cygwin-ug-net/highlights.html#ov-hi-perm
with the following (important bits from
http://cygwin.com/faq/faq.api.html#faq.api.secure ):

<blockquote>
Under Windows NT, users with Administrator rights are permitted to
chown files. With version 1.1.3 Cygwin introduced a mechanism for
setting real and effective UIDs under Windows NT/W2K. This is
described in the section called "NT security and usage of ntsec". As
of version 1.5.13, the Cygwin developers are not aware of any feature
in the Cygwin DLL that would allow users to gain privileges or to
access objects to which they have no rights under Windows. However
there is no guarantee that Cygwin is as secure as the Windows it runs
on. Cygwin processes share some variables and are thus easier targets
of denial of service type of attacks.
</blockquote>

--
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
Problem reports:       http://cygwin.com/problems.html
Documentation:         http://cygwin.com/docs.html
FAQ:                   http://cygwin.com/faq/


