Geoffrey Young <[EMAIL PROTECTED]> writes:

>>    Unfortunately, we have been hit by a [2]uselib() privilege elevation
>>    exploit. As a result, our sysadmins have decided that any CGI/mod_perl
>>    process has to run as a specific user instead of as www-data.
>
> I'll admit to not being the best SA or security-minded guy around, so maybe
> this is obvious to everyone but me.  nevertheless...  I've read through the
> exploit, but I don't follow how changing from one (single) user to other
> (multiple) users helps protect against that exploit. 

me either

> maybe there is some way to trace which specific user ended up doing
> improper root-ish things?  I guess that's a reason, though it's not
> protection.

yes, it certainly just lets us narrow down who led to it and nothing else.

> >
> so, for the betterment of all, what am I missing?

nothing, as far as I can see :)

> >
> --Geoff
>

-- 
        Carter's Compass: I know I'm on the right track when,
           by deleting something, I'm adding functionality.

Reply via email to