lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1104508495.18571.7.camel@localhost> From: frank at knobbe.us (Frank Knobbe) Subject: /bin/rm file access vulnerability On Thu, 2004-12-30 at 20:56 -0700, Jeffrey Denton wrote: > Nothing new here. That is one of the problems with DAC systems, the > admin has total control over the system. [...] > To prevent the above from happening, use a MAC or a RBAC system such > as Trusted Solaris. You should also be able to use file flags such as undeletable and immutable together with higher security levels (at least under BSD) to prevent root to remove/change the file under normal run-levels. (Normal run-levels excludes single-user mode and stunts like mounting the drive in non-native environments.) Regards, Frank -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 187 bytes Desc: This is a digitally signed message part Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041231/3db3fa74/attachment.bin
Powered by blists - more mailing lists