On Sun, Jan 22, 2012 at 10:55 PM, Jason A. Donenfeld <[email protected]> wrote: > Never seen checksec. Cool. Microsoft has a similar tool: BinScope (https://www.microsoft.com/download/en/details.aspx?id=11910).
Compiler and linker hardening is a security gate for projects under my purview. You can go a long way with just following the basics. Jeff > As it turns out, Fedora seems to do a good job at compiling (all? not > sure) their suid executables with -pie. > > On Mon, Jan 23, 2012 at 04:53, Jeffrey Walton <[email protected]> wrote: >> Good point about [lack of] compiler and linker hardening on the `su` >> binary (and probably many others). Perhaps distributions should run >> Checksec (http://www.trapkit.de/tools/checksec.html) on their >> binaries. >> >> On Sun, Jan 22, 2012 at 6:25 PM, Jason A. Donenfeld <[email protected]> wrote: >>> Server presently DoS'd, or dreamhost is tweaking again. >>> >>> Cache link: >>> >>> http://webcache.googleusercontent.com/search?hl=en&safe=off&biw=1009&bih=687&sclient=psy-ab&q=cache%3Ahttp%3A%2F%2Fblog.zx2c4.com%2F749&pbx=1&oq=cache%3Ahttp%3A%2F%2Fblog.zx2c4.com%2F749&aq=f&aqi=g4&aql=&gs_sm=e&gs_upl=1077l2167l0l2282l7l4l0l0l0l0l148l403l2.2l4l0 >>> >>> On Sun, Jan 22, 2012 at 19:19, Jason A. Donenfeld <[email protected]> wrote: >>>> >>>> Hey Everyone, >>>> >>>> I did a detailed write-up on exploiting CVE-2012-0056 that some of >>>> y'all might appreciate. Pretty fun bug to play with -- dup2ing all >>>> over the place for the prize of getting to write arbitrary process >>>> memory into su :-). >>>> >>>> The write up is available on my blog here: http://blog.zx2c4.com/749 . >>>> Enjoy. >>>> >>>> Jason _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
