Bugtraq mailing list archives
LD_PRELOAD potential problems
From: dfs () DOE CARLETON CA (David F. Skoll)
Date: Tue, 11 May 1999 21:51:40 -0400
Many UNIX systems allow you to "pre-load" shared libraries by setting an environment variable LD_PRELOAD. This allows you to do interesting things like replace standard C library functions or even the C interfaces to system calls with your own functions. I recently ran across a piece of software which depended upon knowing the time reasonably accurately. By replacing the time(2) UNIX system call with my own function, I was able to fool the program and get it to misbehave, without the inconvenience of actually changing the system time or even requiring root privileges. If you are writing programs which depend on C library functions or UNIX system calls for secure operation, please distribute only statically-linked versions, as the effort to fool statically-linked binaries is a lot higher than a simple LD_PRELOAD spoof. -- David F. Skoll http://www.roaringpenguin.com
Current thread:
- LD_PRELOAD potential problems David F. Skoll (May 11)
- Re: LD_PRELOAD potential problems James Lockwood (May 13)
- pIRCH32/98 Exploit Mike Arnold (May 14)
- Re: LD_PRELOAD potential problems Roger Espel Llima (May 14)
- Re: LD_PRELOAD potential problems Phillip Vandry (May 14)
- TGAD DoS John Daniele (May 14)
- Netscape Communicator bookmarks <TITLE> security vulnerability Georgi Guninski (May 16)
- <Possible follow-ups>
- Re: LD_PRELOAD potential problems Kragen Sitaker (May 13)
- Re: LD_PRELOAD potential problems Darren J Moffat - Enterprise Services OS Product Support Group (May 14)