Date: Mon, 27 Nov 2006 16:07:56 +0000 (UTC) From: "Michael Richards" <michael@fastmail.ca> To: freebsd-security@freebsd.org Cc: lboehne@damogran.de Subject: Re: freebsd-security Digest, Vol 187, Issue 4 Message-ID: <20061127160757.1DE97861514@mail.fastmail.ca> In-Reply-To: <20061125120036.4D7F216A5FC@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> [It's just a panic]
> I was so transfixed on Josh stating that the attacker could as well
> just mount a filesystem with suid root binaries and how that would be
> more useful than a buffer overflow in the filesystem driver. I totally
> missed the fact that we were talking about two bugs where the kernel
> deliberately called panic() ;).
>
> So in this case I'd agree that the panic() is undesirable, but not
> really a security issue.
In the past we have considered remote DOS type attacks to be a security
issue. In this case people discount it saying if the user has physical
access then it's game over anyway. Althought not as serious as privilege
escalation bugs I would have to say that mounting a user's USB drive
shouldn't allow the system to crash. How about something to force a fsck
before allowing the mount? Would that always catch it?
-Michael
_________________________________________________________________
http://fastmail.ca/ - Fast Secure Web Email for Canadians
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20061127160757.1DE97861514>
