c> heard of in another OS is that if a suid root binary is c> dynamically linked, you could set LD_LIBRARY_PATH and make your c> own little libc which would, say, exec /bin/sh on something like c> printf. Options for both of those (or defaults) might be c> something to look into. Or is that second one fixed in FreeBSD? LD_LIBRARY_PATH, LD_PRELOAD and LD_DEBUG are ignored for setuid executables in FreeBSD. Koshy <[EMAIL PROTECTED]> To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
- Re: deny ktrace without read permissions? Sheldon Hearn
- Re: deny ktrace without read permissions? Warner Losh
- Re: deny ktrace without read permissions? Nate Williams
- Re: deny ktrace without read permissions? Nate Williams
- Re: deny ktrace without read permissions? Sean Eric Fagan
- Re: deny ktrace without read permissions? jkoshy
- Re: deny ktrace without read permissions? Sean Eric Fagan
- Re: deny ktrace without read permissions? Warner Losh
- yet more ways to attack executing binaries (was ... Robert Watson
- Re: yet more ways to attack executing binari... Chris Costello
- Re: yet more ways to attack executing bi... jkoshy
- Re: yet more ways to attack executi... Dominic Mitchell
- Re: yet more ways to attack executi... Nate Williams
- Re: yet more ways to attack executi... Chris Costello
- Re: yet more ways to attack executi... Nate Williams
- Re: yet more ways to attack executi... Matthew Dillon

