Carl Lowenstein wrote:
Stephen Cope wrote:
> Thus all future worms and viruses that require root privileges simply
> need to add "sudo" before their command to execute themselves.
Assuming a reasonable configuration of sudo, a password is needed to
activate sudo privileges. Not sure how the worm etc. is going to do
that.
So J R User does some system administration:
[EMAIL PROTECTED]:~$ sudo echo hello
Password:
hello
And then accidentally bumps the worm which contains the sudo command
hidden inside it:
[EMAIL PROTECTED]:~$ cat malicious
#!/bin/sh
sudo id
[EMAIL PROTECTED]:~$ ./malicious
uid=0(root) gid=0(wheel) groups=0(wheel), ...
No password needed since it had been cached since he last ran sudo.
sudo greatly simplifies privilege elevation. A more traditional
privilege elevation requires more than five bytes.
--
Stephen Cope - http://sdc.org.nz/
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list