Bugtraq mailing list archives

Re: Solaris Signals


From: ari <edelkind-bugtraq () episec com>
Date: Fri, 14 Feb 2003 12:17:29 -0500

Actually, many systems (current versions of solaris included) disallow
user ptrace(2) and restrict /proc access for processes whose binaries
are not readable.  If you compile the binary statically (due to its
sensitive nature), you needn't worry about trickery with dynamic library
instructions.

Note that i only bring this up to further the information; i do not
condone the act of putting sensitive information into a binary that
executes without modified privileges (or, indeed, putting sensitive
information into an executable at all).

ari

--
[http://www.episec.com/people/edelkind/]


fvw () var cx said this stuff:

[...]
Making programs execute-only is no security for such things unless you
add a lot of weird-and-definately-not-wonderful special cases all over
the OS. Even if you stop programs from dumping core if
access(executable, R_OK), you can still do LD_PRELOAD/LD_LIBRARY tricks
and get access to the process' memory (or just log all library or system
calls which gets you all the interesting stuff too, usually), and with
a little creativity there's plenty of other ways to get around lack of
read rights. 

-- 
Frank v Waveren                                      Fingerprint: 21A7 C7F3
fvw@[var.cx|stack.nl|chello.nl] ICQ#10074100            1FF3 47FF 545C CB53
Public key: hkp://wwwkeys.pgp.net/fvw () var cx            7BD9 09C0 3AC1 6DF2


Current thread: