in reply to Re^4: /usr/bin/instmodsh: Permission denied.
in thread /usr/bin/instmodsh: Permission denied.
I would recommend auditing your system. The permissions on these files are not sane, and I would not trust that these are the only ones.
Both the old and the new file permissions are insanely insecure. Whatever set the initial permissions should be sought out summarily executed.
Unix permissions are grouped into a type indicator, and three groups of three permission "bits".
What do you think happens when Read, Write, and Execute are enabled for other (hint: "other" is able to change the file)? Does a privileged user ever execute that file (hint: if "yes", "other" now has control over what privileged user is executing)?
The solution given by the mac forum is accurate (that command adds the execute bit to owner, group, and other), but is incomplete. You also need to remove the write permissions from those files. As mentioned above, I would not trust that these are the only files with insecure permissions.
Update: Removed assumptions about Unix knowledge (added 'hints').
--MidLifeXis
|
|---|