lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALCvwp7NuGzXJ_XsfNNQ4x0=XqG91jKTxL2yrspJgzehfeRPMw@mail.gmail.com> Date: Fri, 28 Oct 2011 00:56:35 +1100 From: xD 0x41 <secn3t@...il.com> To: noloader@...il.com Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Symlink vulnerabilities Oh man thats awesome paper... I love to read tavs stuff but, yea...hmmm. i also PMd vlad, and, exactly showed him, it is same place where it is failing, well, when it comes to clipping in the shell, exactly, it even complains ion removing a file, yet this is also,. in its cocde :s so, something is not winnin and, im so tired ill speak more on this in morning but, i trust you, itcannot be exploited, in any way, it will only cause corruption of tar and compression utils, at most. gnite and, thx for this paper, ill read it b4 i switch the lamp off cheers mate. xd On 28 October 2011 00:51, Jeffrey Walton <noloader@...il.com> wrote: > On Thu, Oct 27, 2011 at 9:43 AM, xD 0x41 <secn3t@...il.com> wrote: >> [SNIP] >> >> This means that right after the "ln" command AND before "/tmp/dd" is >> launched, the user can replace the directory "/tmp/dd" by a shell script >> with the same name ("/tmp/dd"). >> >> You try to change and fiddle here, it would need alot better than just >> the current shell scripting, and, even then, i dnt think it would win >> the race conditiobn. > See Bishop and Dilger's paper: > nob.cs.ucdavis.edu/bishop/papers/1996-compsys/racecond.pdf > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists