[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: Re: [Full-Disclosure] /bin/rm file access vulnerability
From: Frank Knobbe <frank () knobbe ! us>
Date: 2004-12-31 15:54:55
Message-ID: 1104508495.18571.7.camel () localhost
[Download RAW message or body]
[Attachment #2 (multipart/signed)]
On Thu, 2004-12-30 at 20:56 -0700, Jeffrey Denton wrote:
> Nothing new here. That is one of the problems with DAC systems, the
> admin has total control over the system.
[...]
> To prevent the above from happening, use a MAC or a RBAC system such
> as Trusted Solaris.
You should also be able to use file flags such as undeletable and
immutable together with higher security levels (at least under BSD) to
prevent root to remove/change the file under normal run-levels.=20
(Normal run-levels excludes single-user mode and stunts like mounting
the drive in non-native environments.)
Regards,
Frank
["signature.asc" (application/pgp-signature)]
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic