Re: Local users get to play root?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/18/2009 02:29 PM, Richard Hughes wrote:
> 2009/11/18 nodata <lsof@xxxxxxxxxxxx>:
>> You install software with a known buffer overflow before it is fixed and
>> exploit it. More software = more chances to exploit. Bingo!
> 
> Why would the additional package start extra services? I thought there
> were guidelines about that. Anyway, if the user has physical access to
> the machine, there are many quicker ways to root the box in question.
> (Like rebooting, and using grub to go to runlevel 1)
> 
> Richard.
> 

What if they don't? The mechanisms by which we are detecting and proving physical access are easily circumvented. If the buffer overflow allows arbitrary code execution, you need only an "open(/dev/console, ...)" to fool a lot of these mechanisms. Just because a program is interactive on a console does not mean that that's the /only/ place its being controlled from.

--CJD

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux