Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Jan 2001 07:47:23 +0100
From:      "Walter W. Hop" <walter@binity.com>
To:        "Michael R. Wayne" <wayne@staff.msen.com>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: Protections on inetd (and /sbin/* /usr/sbin/* in general)
Message-ID:  <19357397493.20010117074723@binity.com>
In-Reply-To: <200101170335.WAA18537@manor.msen.com>
References:  <200101170335.WAA18537@manor.msen.com>

next in thread | previous in thread | raw e-mail | index | archive | help
>    The exploit managed to start inetd, camped on the specified port

I guess, if it doesn't exist already, that it wouldn't be so hard to
create a small patch to the kernel, so that only processes owned by root,
or a certain group of users (let's say "daemon"), were allowed to set up
listeners...

walter

--
 Walter W. Hop <walter@binity.com> | +31 6 24290808 | NEW KEY: 0x84813998




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19357397493.20010117074723>