Do manual do sendmail / Majordomo:
2.4.1. Consequences of Unsafe Group Writes
If a user has write permission to access an aliases file, she should be a trusted user. By putting an entry into the aliases file (such as the one used to execute wrapper) a user can execute any program with the privileges of Sendmail (daemon or, in older versions, root). This gaffe would allow people to remove or change the permissions of files that belong to daemon (using the
rm
orchmod
commands in the aliases file). To some extent, this possibility is avoided by using smrsh; however, one must still be careful as to what files are in the/etc/smrsh
/ directory.Another important security issue is that the user who can access the aliases file can append or write to files that belong to daemon by using file redirection (
a >>
or>
instead ofa |
). Even so, this breach too can be countered by adding a line to thesendmail.cf
file limiting what files can be written to through the aliases file.
< .. >
In the case of
include
or.forward
files, commands or redirections are run as the user who owns the file. Therefore, if a file is group writable, a member of the group can execute commands as the user who owns the file. In other words, any user in the group could execute commands as that user. However, since the user is created without a shell, commands or redirections will not be processed ininclude
files owned by that user.4.2. Consequences of Unsafe Group Writable Directory Paths
If a user has group write permission to a directory, for example
/etc/
, the user could simply move any file and create a new one in its place. An attack might go something like this
[user@system etc]$ mv aliases ...
[user@system etc]$ vi aliases
The user can then make her own aliases! This attack, however, could be prevented by Sendmail's security checking for unsafe group writable paths. Such an attack also would work with
include
and.forward
files having unsafe paths.
Fonte .
Este manual explica isso muito bem e a mesma lógica se aplica a muitos outros softwares: lembre-se de que você está usando um sistema multiusuário, mesmo que você seja o único usuário desse sistema. E em um sistema multiusuário, um usuário precisa ser protegido de outros usuários.