Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Aug 2003 21:01:03 -1000
From:      Jason Dambrosio <jason@wiz.cx>
To:        Bruce M Simpson <bms@spc.org>
Cc:        FreeBSD Security Advisories <security@freebsd.org>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-03:09.signal
Message-ID:  <20030811070103.GB85000@tekgenesis.net>
In-Reply-To: <20030811064438.GG31845@spc.org>
References:  <200308110257.h7B2v6YJ061278@freefall.freebsd.org> <20030811063316.GA85000@tekgenesis.net> <20030811064438.GG31845@spc.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Aug 11, 2003 at 07:44:38AM +0100, Bruce M Simpson wrote:
> On Sun, Aug 10, 2003 at 08:33:16PM -1000, Jason Dambrosio wrote:
> >     Wouldn't a possible workaround be, to load a kld module that would
> > replace the ptrace(2) system call with a patched one? I remember doing
> > such a trick for modifying other system calls using kld modules...
> 
> That isn't really a solution; more of a band-aid.

    That's exactly why I called it a workaround and not a solution.

    The primary idea of a workaround being to avoid having downtime for
a reboot to patch the kernel until your next scheduled maintence window.

> Besides, if someone compromises the system in some other way, they can
> just remove your module or unload it. Unless you're a big securelevels fan.

    If someone compromises the system via some other method, why would
they care about unloading a module if they already have root?

    My point was simply that the advisory said there was no workaround,
but I believe you could use this method as a workaround.

Jason



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030811070103.GB85000>