Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Aug 1997 14:38:41 -0400 (EDT)
From:      Brian Mitchell <brian@firehouse.net>
To:        "Jonathan A. Zdziarski" <jonz@netrail.net>
Cc:        bugtraq@netspace.org, freebsd-security@FreeBSD.ORG
Subject:   Re: procfs hole
Message-ID:  <Pine.BSI.3.95.970810143743.19099C-100000@shell.firehouse.net>
In-Reply-To: <Pine.BSF.3.95q.970810115145.18416A-100000@netrail.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 10 Aug 1997, Jonathan A. Zdziarski wrote:


This would be a horrible solution. Someone is just going to chose another
function to overwrite and do a setuid(0) and execve() of some shell. 

> Would disabling bash and sh (and any other shells that allowed this) be a
> good temporary solution?  I've noticed you have to have it set as your
> default shell, so removing it from /etc/shells could prevent this.  It's
> either that or disbale procfs (and I'm still not sure what the effects of
> that would be)
> 
> 
> -------------------------------------------------------------------------
> Jonathan A. Zdziarski                                NetRail Incorporated
> Server Engineering Manager                    230 Peachtree St. Suite 500
> jonz@netrail.net                                        Atlanta, GA 30303
> http://www.netrail.net                                    (888) - NETRAIL
> ------------------------------------------------------------------------- 
> 
> 




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSI.3.95.970810143743.19099C-100000>