Date: Sun, 31 Oct 1999 00:32:32 +0200 (MET DST) From: Borja Marcos <borjam@we.lc.ehu.es> To: hackers@freebsd.org Subject: exec() security enhancement Message-ID: <199910302232.AAA16912@sirius.we.lc.ehu.es>
next in thread | raw e-mail | index | archive | help
Hello, Many security exploits create files in the /tmp directory and execute them. I think it would be a good idea to add logging to the to exec_check_permissions() in kern.exec.c so that attempts to run files from a filesystem mounted as "noexec" can be detected. With this measeure, and mounting /tmp as "noexec" some generic hostile acts (wow, how does it sound! :-) ) could be detected. Regards, Borja. -- *********************************************************************** Borja Marcos * Internet: borjam@we.lc.ehu.es Alangoeta, 11 1 izq * borjamar@sarenet.es 48990 - Algorta (Vizcaya) * borjam@well.com SPAIN * CompuServe: 100015,3502 *********************************************************************** --- FreeBSD, turning PCs into workstations To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199910302232.AAA16912>