On Mon, Apr 03, 2006 at 10:33:10PM +0200, Hendrik Weimer wrote:

> Suppose a server performs password checking by
> 
> strncmp(user_supplied_password, password_stored_in_database, size).
> 
> Now strncmp does its comparison by subsequently comparing parts of the
> two strings. Since OProfile allows profiling other users' processes a
> local attacker can see after how many parts the two strings differ. He
> knows which parts of his entered string are correct and therefore can
> greatly reduce the key space.
> 
> Even though this example is a bit far-fetched, I think you'll get the
> idea. Real world attacks would probably be directed at cryptographic
> keys, e.g. in the spirit of [1].

Whilst theoretically /possible/ I seriously doubt that this is
achievable due to the way profiling works in OProfile.

> Probably the best solution would be to restrict reading
> /var/lib/oprofile/samples/current/{$USER}/ to $USER.

There is no such thing and there cannot be.

regards
john


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to