Vulnerability Development mailing list archives
Re: SUID server
From: J C Lawrence <claw () KANGA NU>
Date: Mon, 2 Oct 2000 13:11:20 -0700
On Mon, 2 Oct 2000 14:35:17 +0200 Philipp Buehler <lists () FIPS DE> wrote:
On 01/10/2000, Adam Langley <agl () LINUXPOWER ORG> wrote To VULN-DEV () SECURITYFOCUS COM:
the traceroute.so file and continues. The data from the frontend is checked and parsed and passed the the traceroute backend which (running as root)
So, you write a check/parser for *any* suid binary behind it?
I would look at it as directly similar to the way PAM and PAM modules are currently implemented. -- J C Lawrence Home: claw () kanga nu ---------(*) Other: coder () kanga nu http://www.kanga.nu/~claw/ Keys etc: finger claw () kanga nu --=| A man is as sane as he is dangerous to his environment |=--
Current thread:
- SUID server Adam Langley (Oct 01)
- Re: SUID server antirez (Oct 02)
- Re: SUID server Philipp Buehler (Oct 02)
- Re: SUID server J C Lawrence (Oct 02)
- Re: SUID server Philipp Buehler (Oct 03)
- Re: SUID server J C Lawrence (Oct 02)
- <Possible follow-ups>
- Re: SUID server Kay Three (Oct 10)