Vulnerability Development mailing list archives

Re: OT? Are chroots immune to buffer overflows?


From: "Steve Bremer" <steveb () nebcoinc com>
Date: Fri, 24 May 2002 07:45:19 -0500

For example, a chroot jail does not prevent execution of
systems calls from within the vulnerable program address
space therefore the exploit code can easily break out of the chroot
jail or call setuid(0) to regain root privileges or perform socket

How can a non-root process gain root privileges by calling 
setuid(0)?  As long as the process is not running as root, this will 
fail.  If there are any setuid root binaries in the chroot jail, those 
could possibly be exploited to gain root privileges.

Steve Bremer


Current thread: