On Sun, Feb 25, 2007 at 08:54:38AM -0800, Paul Eggert wrote: > "James Youngman" <[EMAIL PROTECTED]> writes: > > > * The hacker now has access to a setuid binary which he knows has a > > security problem. A websearch will probably reveal an exploit. > > Hackers don't need to inspect hard links to do that. They can simply > compute the checksums of the standard executables, or even just look > at their time stamps. So this argument is a weak one.
I think his point is that the cracker managed to keep a setuid link to her target binary in the system despite that administrator had attempted to replace it. -- Robert Millan ACK STORM, S.L. - http://www.ackstorm.es/ _______________________________________________ Bug-coreutils mailing list [email protected] http://lists.gnu.org/mailman/listinfo/bug-coreutils
