On Fri Mar 14, 2003 at 03:11:24PM +0000, Adam Williamson wrote:

> Not entirely. You also have to lock your case shut somehow to stop
> someone opening it up and flicking the BIOS reset...
> 
> Anyway, in regards to the original bug, this isn't purely a local
> exploit, surely? Doesn't it also apply to someone ssh'ing in from a
> remote site? i.e., I could give a simple user account to someone in
> Australia, thinking it's safe, and they could then ssh in and use this
> exploit to get a root shell?

No.  This is a console-only thing, driven by pam.  pam only allows users at
a physical console access to this.  Same with halt and reboot, which act as
expected.

-- 
MandrakeSoft Security; http://www.mandrakesecure.net/
Online Security Resource Book; http://linsec.ca/
"lynx -source http://linsec.ca/vdanen.asc | gpg --import"
{FE6F2AFD : 88D8 0D23 8D4B 3407 5BD7  66F9 2043 D0E5 FE6F 2AFD}

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to