/usr/lib/tiger/html/embed.html is in tiger 1:3.2.3-10.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 | <HR><PRE>
</PRE><HR>
<CENTER><H2> Documents for embed</H2></CENTER>
<A NAME="embed"><P><B>Code [embed]</B><P>
The embedded references are formatted as
<P>
pathname_1->pathname_2->pathname_3...
<P>
which indicates that pathname_1 is a string embedded in the
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
pathname_3 refers to pathname_2 which refers to pathname_1.
<PRE>
</PRE><HR>
<A NAME="embed001w"><P><B>Code [embed001w]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated pathname to an executable contains a component which is not
owned by root. This can enable an intruder to gain unauthorized privileges
if they are able to replace the binary. See the 'rationale' explanation
for a discussion of the reasons that executables run by root should be
owned by root.
<PRE>
</PRE><HR>
<A NAME="embed001i"><P><B>Code [embed001i]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated pathname to a file or directory contains a component which
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
found to determine whether there is a problem.
<PRE>
</PRE><HR>
<A NAME="embed002w"><P><B>Code [embed002w]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
by root.
<P>
Note that if the executable is setuid to a non-root ID, then the
ownershop should *NOT* be changed to root unless the setuid bit
is also removed.
<PRE>
</PRE><HR>
<A NAME="embed002i"><P><B>Code [embed002i]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated file or directory is not owned by root. This may
indicate a vulnerability in the system. It will be necessary to study
the programs in which the pathname was found to determine whether
there is a problem.
<PRE>
</PRE><HR>
<A NAME="embed003w"><P><B>Code [embed003w]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated pathname to an executable contains a component which
is group writable, world writable or both. This can enable an intruder
to gain unauthorized privileges if they are able to replace the
executable.
<PRE>
</PRE><HR>
<A NAME="embed003i"><P><B>Code [embed003i]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The indicated pathname to a file or directory contains a component
which is group writable, world writable or both. This may indicate a
vulnerability in the system. It will be necessary to study the file
and programs in which the pathname was found to determine whether
there is a problem.
<PRE>
</PRE><HR>
<A NAME="embed004w"><P><B>Code [embed004w]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The executable is group writable, world writable or both. This can
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable.
<PRE>
</PRE><HR>
<A NAME="embed004i"><P><B>Code [embed004i]</B><P>
See the 'embed' explanation for an explanation of the format of the
embedded references.
<P>
The file or directory is group writable, world writable or both. This
may indicate a vulnerability in the system. It will be necessary to
study the file and programs in which the pathname was found to
determine whether there is a problem.
|