lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAH8yC8=dgvsyvssA0ut0-53iOeZ6rKBNOjkrODoNVaZKgh_wVg@mail.gmail.com> Date: Thu, 27 Oct 2011 09:51:33 -0400 From: Jeffrey Walton <noloader@...il.com> To: secn3t@...il.com Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Symlink vulnerabilities On Thu, Oct 27, 2011 at 9:43 AM, xD 0x41 <secn3t@...il.com> wrote: > [SNIP] > > This means that right after the "ln" command AND before "/tmp/dd" is > launched, the user can replace the directory "/tmp/dd" by a shell script > with the same name ("/tmp/dd"). > > You try to change and fiddle here, it would need alot better than just > the current shell scripting, and, even then, i dnt think it would win > the race conditiobn. See Bishop and Dilger's paper: nob.cs.ucdavis.edu/bishop/papers/1996-compsys/racecond.pdf _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists