lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 28 Mar 2010 12:27:10 -0400 From: Dan Rosenberg <dan.j.rosenberg@...il.com> To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com Subject: Exploiting nano I just finished a blog post detailing how the popular text editor, nano, is unsafe to run as root to edit untrusted users' files, with consequences including full privilege escalation: http://drosenbe.blogspot.com/2010/03/nano-as-root.html This is not a disclosure of vulnerabilities per se; rather, it's just a look at how some security assumptions may not hold when running programs as root in a hostile environment, using nano as an example. Nothing earth-shattering, just thought some of you might be interested. Comments welcome. -Dan
Powered by blists - more mailing lists