Re: strings /dev/mem > out

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 






>But anyway, it really doesn't matter. With the right permissions only
>root has access to /dev/mem so nobody can get the plain text password.
>If somebody already got root on the machine, you already *have* a
>problem cause (s)he shouldn't have got root anyway.

What I had in mind was that one can exploit a buffer overflow and read
/dev/mem.  Even though when the buffer overflow is patched, you still have
a legitimate backdoor.  No SUID , trjoans or lkms needed to re-enter as
root.  Or maybe add a new user like "httpbackup" and change the group of
the user as kmem so that he knows the root password all the way.
But i guess bzero'ing the the buffers is what needs to be done ... n
something i would like to take care of in the future in my code.

--
Kernelnewbies: Help each other learn about the Linux kernel.
Archive:       http://mail.nl.linux.org/kernelnewbies/
IRC Channel:   irc.openprojects.net / #kernelnewbies
Web Page:      http://www.kernelnewbies.org/


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux