Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 15 Sep 2009 17:05:52 -0700
From:      Xin LI <delphij@delphij.net>
To:        Chris Palmer <chris@noncombatant.org>
Cc:        freebsd-security@freebsd.org, utisoft@googlemail.com
Subject:   Re: FreeBSD bug grants local root access (FreeBSD 6.x)
Message-ID:  <4AB02BE0.1030305@delphij.net>
In-Reply-To: <20090915202703.GF24361@noncombatant.org>
References:  <4AAF45B4.60307@isafeelin.org>	<0016e6d99efa540b8b047399738b@google.com> <20090915202703.GF24361@noncombatant.org>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Chris Palmer wrote:
> utisoft@googlemail.com writes:
> 
>> It appears to only affect 6.x.... and requires local access. If an
>> attacker has local access to a machine you're screwed anyway.
> 
> No, the thing you're screwed anyway by is local *physical* access. Merely
> running a process as a non-root local user should *not* be a "you're screwed
> anyway" scenario. The fundamental security guarantee of a modern operating
> system is that different principals cannot affect each other's resources
> (user chris cannot read or write user jane's email -- let alone root's
> email). This bug breaks that guarantee, and is definitely not a ho-hum bug.

Exactly.  This type of vulnerability could turn into a serious threat if
being used with some other vulnerabilities that allows code injection,
which is worse.

Cheers,
- --
Xin LI <delphij@delphij.net>	http://www.delphij.net/
FreeBSD - The Power to Serve!
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.12 (FreeBSD)

iEYEARECAAYFAkqwK+AACgkQi+vbBBjt66Cu2gCfQWDWssPUTP+YESUOS7pJXCal
TY0An332WH2WDUiF1vhlgOW+QUk9U0rk
=S2nD
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4AB02BE0.1030305>