Bugtraq mailing list archives
Re: X11 cookie hijacker
From: tarreau () AEMIAIF LIP6 FR (Willy TARREAU)
Date: Wed, 4 Nov 1998 09:58:21 +0100
Potential solutions: - set the sticky bit on /tmp/.X11-unix, make sure the bit stays there
the sticky bit doesn't always prevent some DoS. A few years ago, I used to reserve a workstation for myself so that nobody else could start X on it; when noone uses X11 and /tmp/.X11-unix is empty : mkdir /tmp/.X11-unix/X0 touch /tmp/.X11-unix/X0/no-delete chmod 0 /tmp/.X11-unix/X0 then it is impossible to create the socket X0, because of the X0 directory which is undeletable (not empty). The other solutions you proposed should work, I think.
--Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "You can't be truly paranoid unless you're sure they have already got you."
Willy
Current thread:
- X11 cookie hijacker Pavel Kankovsky (Nov 02)
- SSHD Exploit Justin Foutts (Nov 01)
- ISS Security Advisory: BMC PATROL File Creation Vulnerability X-Force (Nov 02)
- Re: X11 cookie hijacker David Dawes (Nov 02)
- Re: X11 cookie hijacker Alan Cox (Nov 03)
- Re: X11 cookie hijacker Olaf Kirch (Nov 05)
- [rootshell] Security Bulletin #25 Aleph One (Nov 03)
- Re: X11 cookie hijacker Willy TARREAU (Nov 04)
- Re: X11 cookie hijacker Casper Dik (Nov 04)
- <Possible follow-ups>
- Re: X11 cookie hijacker der Mouse (Nov 04)
- Regarding the reported DOS against the internal interface of a WatchGuard Rapid Response (Nov 04)
- IE 4.x does not appear to save custom security settings John Schultz (Nov 04)
- Re: X11 cookie hijacker David Dawes (Nov 04)
- xlock mishandles malformed .signature/.plan Aaron Campbell (Nov 04)
- Making xlock setuid root Stefan Rompf (Nov 06)