but assuming you have multiple users on your system, how do you
propose that a target be tricked into cd'ing into a trojaned directory
and attempt to execute the magic command.  what would this trojaned
command do?  without setuid (or a superuser), the options are more
constrained.

How about forking off a server process that lets me execute arbitrary commands as you?

How about placing trojan processes in your person bin directory?

How about subtly corrupting all of the writable data in your filesystem?

How about setting up a spam bot on your machine? Using your machine as part of a distributed denial-of-service attack against some other networked machines?

How about replacing your compiler with one that introduces errors nondeterministically? Changing your acme to occasionally not save your data?

If you sit down and think of it for a little bit you'll notice this is just the tip of the iceburg. There are lots of irritating things that can happen even without setuid or a super user.

- erik

Tim Newsham
http://www.thenewsh.com/~newsham/

Reply via email to