Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 31 Oct 1999 00:32:32 +0200 (MET DST)
From:      Borja Marcos <borjam@we.lc.ehu.es>
To:        hackers@freebsd.org
Subject:   exec() security enhancement
Message-ID:  <199910302232.AAA16912@sirius.we.lc.ehu.es>

next in thread | raw e-mail | index | archive | help


	Hello,

	Many security exploits create files in the /tmp directory
and execute them. I think it would be a good idea to add logging
to the to exec_check_permissions() in kern.exec.c so that attempts
to run files from a filesystem mounted as "noexec" can be detected.

	With this measeure, and mounting /tmp as "noexec" some
generic hostile acts (wow, how does it sound! :-) ) could be
detected.

	Regards,



	Borja.


	
-- 
***********************************************************************
Borja Marcos			* Internet: borjam@we.lc.ehu.es
Alangoeta, 11 1 izq		*	    borjamar@sarenet.es
48990 - Algorta (Vizcaya)	*           borjam@well.com
SPAIN				* CompuServe: 100015,3502
***********************************************************************
--- FreeBSD, turning PCs into workstations


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199910302232.AAA16912>