In article <[EMAIL PROTECTED]>,
Mark Crispin  <[EMAIL PROTECTED]> wrote:
> If you have a "closed" system (which is the only type of system where this bug
> matters), a much better solution is to insert the following instruction in
> routine pw_login() in env_unix.c:
>   if (chroot (home ? home : ANONYMOUSHOME)) chroot ("/tmp");

(1) Shouldn't this be:

        if (chroot (home ? home : ANONYMOUSHOME)) log_fatal_error_and_exit;

(2) Being able to execute arbitrary code on a TCP/IP-connected system, even
    from a chrooted "jail", may be worthwhile. One can mount attacks on other
    systems, possibly in a DMZ, and at any rate get another host to run DDOS
    software on.

(3) Defense in depth. If you find a hole, you close it, that way any hole
    behind this one can't be exploited.

> Another important measure is to use StackGuard.  I am very surprised at the
> implication that RedHat doesn't use StackGuard.  Is that really true?

StackGuard is another example of defense-in-depth.

Reply via email to