Re: ~/.login_conf mechanism is flawed

看板FB_security作者時間15年前 (2010/08/13 03:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串10/13 (看更多)
On Thu, 12 Aug 2010, Mike Tancsa wrote: > Are there any other tricks / work around people have implemented ? MACs ? Binary patch libutil: 1. cd /lib 2. perl -pi.bak -e 's!\.login_conf!../.noexist!;' libutil.so.* 3. /etc/rc.d/sshd restart ; /etc/rc.d/ftpd restart The above binary patch makes the login procedure to look for a file called ".noexist" one level up from the user's home directory. If that directory is not writable by the user (as is typically), the patch will protect you from the potential vulnerability (by disabling user-specific capabilities processing). (Yes, you can use perl regular expressions to do binary patches. They do not seem to break anything in the binary data. I have been doing similar things for years. sed is not robust for this purpose. Obviously you will break everything if the replacement string is not of the same length as the original.) I was looking at the lib/libc/db code today for some time. valgrind reports several out-of-allocated-space accesses when db functions are given a malicious .db file (__getbuf_crash_suspicious.db from HI-TECH's mail attachment for example). The code is somewhat complicated to understand, as I am not familiar with it, thus no real solution (from me at least). -- Janne Snabb / EPIPE Communications snabb@epipe.com - http://epipe.com/ _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1CP4mqt5 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1CP4mqt5 (FB_security)