Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 16 Aug 1998 15:10:56 +0200
From:      Philippe Regnauld <regnauld@deepo.prosa.dk>
To:        rotel@indigo.ie
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: "Using capabilties aaginst shell code" <dps@IO.STARGATE.CO.UK>
Message-ID:  <19980816151056.63692@deepo.prosa.dk>
In-Reply-To: <199808151348.OAA00655@indigo.ie>; from Niall Smart on Sat, Aug 15, 1998 at 02:48:11PM %2B0000
References:  <19980815131309.14782@deepo.prosa.dk> <199808151348.OAA00655@indigo.ie>

next in thread | previous in thread | raw e-mail | index | archive | help
Niall Smart writes:
> > 
> > 	The point was to limit the number of outside attacks on 
> > 	priviledged network daemons.  Once the system has been broken
> > 	into, it's over...  "Just keep people out"
> 
> I'm not sure what you mean by this; disabling execve doesn't prevent
> outside attacks on network daemons.

	No, but it will prevent buffer overflows that spawn a root shell
	(i.e.: qpopper) -- or am I missing something ?

-- 
 -[ Philippe Regnauld / sysadmin / regnauld@deepo.prosa.dk / +55.4N +11.3E ]-

               The Internet is busy.  Please try again later.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980816151056.63692>