Bugtraq mailing list archives
Re: Security Hole in Axent ESM
From: patrick () CS VIRGINIA EDU (Patrick)
Date: Wed, 2 Sep 1998 14:50:57 -0400
Yes. Process capability restrictions. CAP_TIME or something like that could be easily implemented.
Looks like it already has. (Except that capabilities still aren't in the ext2 code of mainstream kernels, are they?) Look in kernel 2.1.119 at include/linux/capability.h, lines 246-250 and kernel/time.c, lines 155-160. --Patrick
Current thread:
- Re: Security Hole in Axent ESM Jeffrey Hutzelman (Aug 31)
- Re: Security Hole in Axent ESM Caskey L. Dickson (Sep 01)
- Re: Security Hole in Axent ESM Taral (Sep 02)
- Re: Security Hole in Axent ESM Patrick (Sep 02)
- Borderware predictable initial TCP racer-x () ALTAVISTA NET (Sep 02)
- Re: Borderware predictable initial TCP Aggelos P. Varvitsiotis (Sep 03)
- Web servers / possible DOS Attack / mime header flooding Laurent FACQ (Sep 03)
- Re: Web servers / possible DOS Attack / mime header flooding Vanja Hrustic (Sep 03)
- wwwboard.pl vulnerability bugtraq (Sep 03)
- Re: Web servers / possible DOS Attack / mime header flooding Rich Wood (Sep 03)
- Re: Web servers / possible DOS Attack / mime header flooding Daniel Leeds (Sep 03)
- Re: Web servers / possible DOS Attack / mime header flooding Lars Eilebrecht (Sep 03)
- Re: Security Hole in Axent ESM Taral (Sep 02)
- Fwd: [ISN] Another BO detector that is actually a trojan Reuben Yau (Sep 03)
- Security Bulletins Digest (fwd) Piotr Strzy¿ewski (Sep 03)
- Re: Security Hole in Axent ESM Caskey L. Dickson (Sep 01)