Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 27 Nov 2006 16:07:56 +0000 (UTC)
From:      "Michael Richards" <michael@fastmail.ca>
To:        freebsd-security@freebsd.org
Cc:        lboehne@damogran.de
Subject:   Re: freebsd-security Digest, Vol 187, Issue 4
Message-ID:  <20061127160757.1DE97861514@mail.fastmail.ca>
In-Reply-To: <20061125120036.4D7F216A5FC@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
> [It's just a panic]
> I was so transfixed on Josh stating that the attacker could as well
> just mount a filesystem with suid root binaries and how that would be
> more useful than a buffer overflow in the filesystem driver. I totally
> missed the fact that we were talking about two bugs where the kernel
> deliberately called panic() ;).
> 
> So in this case I'd agree that the panic() is undesirable, but not
> really a security issue.

In the past we have considered remote DOS type attacks to be a security
issue. In this case people discount it saying if the user has physical
access then it's game over anyway. Althought not as serious as privilege
escalation bugs I would have to say that mounting a user's USB drive
shouldn't allow the system to crash. How about something to force a fsck
before allowing the mount? Would that always catch it?

-Michael
_________________________________________________________________
    http://fastmail.ca/ - Fast Secure Web Email for Canadians




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20061127160757.1DE97861514>