On Aug 15, 2011, at 7:27 PM, Earlence wrote:

> Rodrigo: true. But this will be helpful in curbing malware. Even after
> the device has been rooted, setuid HAS to be called to elevate.
> Therefore, this should prevent that.

No, this is not true. For example, if you exploit a bug in the kernel, your 
payload executes in the kernel with kernel privileges. (And it is utterly Game 
Over — no mitigation can help.)

> Nathaniel: Race condition is true. However, the check is performed in
> setuid, that means, the system server is invoked before the escalation
> is complete, and hence, before the malware process becomes root.

This does not make sense.


Generally, don't expect to survive after an attacker has elevated to 
root/kernel. Instead, work on finding and fixing bugs.

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to android-security-discuss@googlegroups.com.
To unsubscribe from this group, send email to 
android-security-discuss+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to