oss-sec mailing list archives
Re: /dev/ptmx timing
From: Vasily Kulikov <segoon () openwall com>
Date: Tue, 8 Jan 2013 10:53:21 +0400
On Tue, Jan 08, 2013 at 06:43 +0400, Dmitry V. Levin wrote:
On Mon, Jan 07, 2013 at 08:11:11PM -0500, adam swanda wrote:Don't you need to be running as root for this to be possible?You certainly haven't followed the link listed below, have you? The elegance of this timing attack is that all you need is inotify_add_watch(fd, "/dev/ptmx", IN_MODIFY) which is usually available to everybody who has read access to /dev/ptmx.
FWIW, more harmless ways to (ab)use inotify were posted to ossec 2 years ago: http://www.openwall.com/lists/kernel-hardening/2011/07/22/1 Thanks, -- Vasily Kulikov http://www.openwall.com - bringing security into open computing environments
Current thread:
- /dev/ptmx timing vladz (Jan 07)
- Re: /dev/ptmx timing adam swanda (Jan 07)
- Re: /dev/ptmx timing Dmitry V. Levin (Jan 07)
- Re: /dev/ptmx timing Vasily Kulikov (Jan 07)
- Re: /dev/ptmx timing Dmitry V. Levin (Jan 07)
- Re: /dev/ptmx timing Kurt Seifried (Jan 07)
- Re: /dev/ptmx timing adam swanda (Jan 07)