On Sun, 3 Feb 2008 21:55:18 -0500, Axton wrote:

>Some more digging revealed the following:
>
>http://www.opengroup.org/onlinepubs/009695399/functions/popen.html
>
>The *popen*() function should not be used by programs that have set user (or
>group) ID privileges. The
>*fork*()<http://www.opengroup.org/onlinepubs/009695399/functions/fork.html>and
>*exec 
><http://www.opengroup.org/onlinepubs/009695399/functions/exec.html>*family
>of functions (except
>*execlp*()<http://www.opengroup.org/onlinepubs/009695399/functions/execlp.html>and
>*execvp*()<http://www.opengroup.org/onlinepubs/009695399/functions/execvp.html>),
>should be used instead. This prevents any unforeseen manipulation of the
>environment of the user that could cause execution of commands not
>anticipated by the calling program.

Basically all that says is whatever is run under popen runs as the
caller. In this case ARS, which should not have those privileges - and
if they are running as root they deserve all they get :-) Calling
something that uses popen from ARS is no better or worse than invoking
any other command with a run process.


--
Regards

Dave Saville

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
Platinum Sponsor: www.rmsportal.com ARSlist: "Where the Answers Are"

Reply via email to