Date: Sun, 10 Aug 1997 14:38:41 -0400 (EDT) From: Brian Mitchell <brian@firehouse.net> To: "Jonathan A. Zdziarski" <jonz@netrail.net> Cc: bugtraq@netspace.org, freebsd-security@FreeBSD.ORG Subject: Re: procfs hole Message-ID: <Pine.BSI.3.95.970810143743.19099C-100000@shell.firehouse.net> In-Reply-To: <Pine.BSF.3.95q.970810115145.18416A-100000@netrail.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 10 Aug 1997, Jonathan A. Zdziarski wrote: This would be a horrible solution. Someone is just going to chose another function to overwrite and do a setuid(0) and execve() of some shell. > Would disabling bash and sh (and any other shells that allowed this) be a > good temporary solution? I've noticed you have to have it set as your > default shell, so removing it from /etc/shells could prevent this. It's > either that or disbale procfs (and I'm still not sure what the effects of > that would be) > > > ------------------------------------------------------------------------- > Jonathan A. Zdziarski NetRail Incorporated > Server Engineering Manager 230 Peachtree St. Suite 500 > jonz@netrail.net Atlanta, GA 30303 > http://www.netrail.net (888) - NETRAIL > ------------------------------------------------------------------------- > >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSI.3.95.970810143743.19099C-100000>