Matt Sergeant writes:
> There's a huge difference in what they are trying to achieve though. 
> POE doesn't open any files and it doesn't write any files to disk. None 
> of it is written in C (yet), so unless there's a buffer overrun or type 
> mismatch bug in perl you can exploit, you're not going to get in that 
> way.

I agree that Perl is a "safe" language (independent of taint, which
adds safety).  Unfortunately, there has been a history of insecure Perl
programs (formail.pl, I think being the most famous).  This may be
a consequence of "bad programming", but you have to look at the
average if you are selecting a system without reviewing every line of
code, i.e., performing a security audit.

I trust Linux more than Apache, for example, because Linux is not only
older, but was built using an interface design which is 30 years old
and has been allowed to evolve.

> I'm not honestly suggesting it's bug free, but I fail to see how a bug 
> in POE would give you access to the system.

Use of a user string incorrectly in a "system" or "open" might do it.
Also, an incorrect chown, chmod, umask, etc.

> Now user code written on top of POE (or Apache) is another matter 
> altogether.

:)

Rob



Reply via email to