Re: /proc filesystem allows bypassing directory permissions on

看板Bugtraq作者時間16年前 (2009/10/27 07:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串12/47 (看更多)
--=-xKkJcK7USsN2R4Rb9Hd8 Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Am Samstag, den 24.10.2009, 01:12 +0400 schrieb Dan Yefimov: > On 24.10.2009 0:35, Matthew Bergin wrote: > > doesnt look like the original owner is trying to write to it. Shows it > > cant, it had guest write to it via the proc folders bad permissions. > > Looks legitimate > > > Please tell me, who issued 'chmod 0666 unwritable_file'? Was that an atta= cker?=20 > No, that was the owner of 'unwritable_file', nobody else. What the 0666 f= ile=20 > mode means? It means, that everybody can write to the file, can't he? So = why do=20 > you believe that pretension legitimate? Well, at first I would say this might definitely somewhat unexpected. It's correct otoh, that you shouldn't be too lax with files when you think you "secured" them somewhere in the path...=20 But if you think of /proc/x/fd as *hard* links to the files, then the behavior would not be surprising, which might help... (You might have this as a "real world scenario" if you have some brain dead application which you try to secure in this way...) Klaus --=20 ------------------------------------------------------------------------=20 Klaus Lichtenwalder, Dipl. Inform., http://lklaus.homelinux.org/Klaus/ PGP Key fingerprint: A5C0 F73A 2C83 96EE 766B 9C62 DB6D 1258 0E9B B6D1 --=-xKkJcK7USsN2R4Rb9Hd8 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Dies ist ein digital signierter Nachrichtenteil -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEABECAAYFAkrkHooACgkQ220SWA6bttFjYgCfbtm5yW+bwCfxQ8vB3d0DJx2K /tAAn2kBb4d7fMV0fxRYrUqvUlvyOzOb =+LWP -----END PGP SIGNATURE----- --=-xKkJcK7USsN2R4Rb9Hd8--
文章代碼(AID): #1AvYelvE (Bugtraq)
討論串 (同標題文章)
完整討論串 (本文為第 12 之 47 篇):
文章代碼(AID): #1AvYelvE (Bugtraq)