In: Computer Science
Write a paragraph or two explaining things about Set-UID in Ubuntu
`Hey,
Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.
While the setuid bit is used, the conduct described above it's
changed so that when baically an executable is actually launched,
it does not run with the privileges of the user who released it,
however with that of the document proprietor as an alternative. So,
as an instance, if an executable has the setuid bit set on it, and
it's owned by root, while released utilizing an everyday user, it's
going to run with root privileges. It has to be clear why this
represents an ability security chance, if not used
effectively.
A basic example of an executable which is with the setuid
permission set is passwd, the software we will use to alternate our
login password. We will verify that with the aid of the use of the
ls command:
ls -l /bin/passwd
-rwsr-xr-x. 1 root root 27768 Feb 21 2017 /bin/passwd
How to discover the setuid bit? As you have noticed looking at the
output of the command above, the setuid bit is represented with the
aid of an s in place of the x of the executable bit. The s
basically implies that the executable bit is set. Otherwise you'll
see a capital S. This occurs when the setuid bits are set, however,
the executable bit is not, showing the user an inconsistency: the
setuid bits don't have any effect if the executable bit isn't set.
The setuid bit has no impact on directories.
Kindly revert for any queries
Thanks.