Bugtraq mailing list archives
Re: Buffer Overflows: A Summary
From: tqbf () enteract com (Thomas H. Ptacek)
Date: Fri, 2 May 1997 12:33:00 -0500
Another alternative that has the advantage of already existing and being relatively easy to use is the chroot() system call. For example, named would be a much less attractive target it if chroot()ed to /etc/namedb (or whatever) as soon as it knew where its startup directory was. Then all named could do is mangle your name service files.
On almost all Unix operating systems, having superuser access in a chroot() jail is still dangerous. In some recent revisions of 4.4BSD operating systems, root can trivially escape chroot(), as well. ---------------- Thomas Ptacek at EnterAct, L.L.C., Chicago, IL [tqbf () enteract com] ---------------- "If you're so special, why aren't you dead?"
Current thread:
- Windows NT 4.0 SAM hotfix, (continued)
- Windows NT 4.0 SAM hotfix Aleph One (May 02)
- Re: Buffer Overflows: A Summary Lamont Granquist (May 03)
- Solaris lpNet & temp files (exploit) Chris Sheldon (May 03)
- Re: Solaris lpNet & temp files (exploit) Casper Dik (May 07)
- A bug in Elm fflush (May 04)
- Re: A bug in Elm Larry Schwimmer (May 04)
- Hole in the KDE desktop Alan Cox (May 05)
- A vulnerability in Lynx (all versions) fflush (May 05)
- Re: A vulnerability in Lynx (all versions) Theo de Raadt (May 05)
- SGI Security Advisory 19970101-02-PX - csetup Program SGI Security Coordinator (May 05)
- Re: Buffer Overflows: A Summary Thomas H. Ptacek (May 02)
- Comments on NT user list exploit webroot (May 05)
- Re: Buffer Overflows: A Summary Adam Shostack (May 05)
- Re: Buffer Overflows: A Summary Eilon Gishri (May 06)
- Administratrivia Aleph One (May 06)
- SGI Security Advisory 19970501-01-A - Vulnerability in webdist.cgi SGI Security Coordinator (May 06)
- Re: SGI Security Advisory 19970501-01-A - Vulnerability in Kari E. Hurtta (May 06)