On Fri Mar 14, 2003 at 03:11:24PM +0000, Adam Williamson wrote: > Not entirely. You also have to lock your case shut somehow to stop > someone opening it up and flicking the BIOS reset... > > Anyway, in regards to the original bug, this isn't purely a local > exploit, surely? Doesn't it also apply to someone ssh'ing in from a > remote site? i.e., I could give a simple user account to someone in > Australia, thinking it's safe, and they could then ssh in and use this > exploit to get a root shell?
No. This is a console-only thing, driven by pam. pam only allows users at a physical console access to this. Same with halt and reboot, which act as expected. -- MandrakeSoft Security; http://www.mandrakesecure.net/ Online Security Resource Book; http://linsec.ca/ "lynx -source http://linsec.ca/vdanen.asc | gpg --import" {FE6F2AFD : 88D8 0D23 8D4B 3407 5BD7 66F9 2043 D0E5 FE6F 2AFD}
pgp00000.pgp
Description: PGP signature
