Re: Rooting FreeBSD , Privilege Escalation us

看板FB_security作者時間14年前 (2011/05/07 02:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串3/5 (看更多)
On 6 May 2011 17:18, "Mark Felder" <feld@feld.me> wrote: > > On Fri, 06 May 2011 10:13:50 -0500, Daniel Jacobsson < daniel.jacobsson.90@gmail.com> wrote: > >> Can someone confirm if this bugg/exploit works? > > > It's really not a bug or exploit... it's just the guy being crafty. It only makes sense: the jails access the same filesystem as the host. Put a file setuid in the jail and use your user on the host to execute that file and voila, you're now running that executable as root. > > Your users should NEVER have access to the host of the jail. > > _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1Dn3wZCP (FB_security)
文章代碼(AID): #1Dn3wZCP (FB_security)