Date: Sat, 31 Jul 2010 15:41:36 +0300 From: Kostik Belousov <kostikbel@gmail.com> To: Selphie Keller <selphie.keller@gmail.com> Cc: freebsd-security@freebsd.org Subject: Re: kernel module for chmod restrictions while in securelevel one or higher Message-ID: <20100731124136.GN22295@deviant.kiev.zoral.com.ua> In-Reply-To: <235BB726E71747BA980A0EF60F76ED37@2WIRE304> References: <235BB726E71747BA980A0EF60F76ED37@2WIRE304>
next in thread | previous in thread | raw e-mail | index | archive | help
--9j9z4uig7ElIUlwi Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, Jul 30, 2010 at 11:18:39PM -0700, Selphie Keller wrote: > Kernel module for chmod restrictions while in securelevel one or higher: > http://gist.github.com/501800 (fbsd 8.x) >=20 > Was looking at the new recent sendfile/mbuf exploit and it was using a > shellcode that calls chmod syscall to make a setuid/setgid binary. However Can you point to the exploit (code) ? --9j9z4uig7ElIUlwi Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (FreeBSD) iEYEARECAAYFAkxUGgAACgkQC3+MBN1Mb4j7XgCeN3eeGinQ28eRSz/KRXPcL/uW E0sAoOyFDWeOQasKxsr8aMgjahuKr7iP =fWxs -----END PGP SIGNATURE----- --9j9z4uig7ElIUlwi--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100731124136.GN22295>