Date: Tue, 15 Sep 2009 17:05:52 -0700 From: Xin LI <delphij@delphij.net> To: Chris Palmer <chris@noncombatant.org> Cc: freebsd-security@freebsd.org, utisoft@googlemail.com Subject: Re: FreeBSD bug grants local root access (FreeBSD 6.x) Message-ID: <4AB02BE0.1030305@delphij.net> In-Reply-To: <20090915202703.GF24361@noncombatant.org> References: <4AAF45B4.60307@isafeelin.org> <0016e6d99efa540b8b047399738b@google.com> <20090915202703.GF24361@noncombatant.org>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Chris Palmer wrote: > utisoft@googlemail.com writes: > >> It appears to only affect 6.x.... and requires local access. If an >> attacker has local access to a machine you're screwed anyway. > > No, the thing you're screwed anyway by is local *physical* access. Merely > running a process as a non-root local user should *not* be a "you're screwed > anyway" scenario. The fundamental security guarantee of a modern operating > system is that different principals cannot affect each other's resources > (user chris cannot read or write user jane's email -- let alone root's > email). This bug breaks that guarantee, and is definitely not a ho-hum bug. Exactly. This type of vulnerability could turn into a serious threat if being used with some other vulnerabilities that allows code injection, which is worse. Cheers, - -- Xin LI <delphij@delphij.net> http://www.delphij.net/ FreeBSD - The Power to Serve! -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.12 (FreeBSD) iEYEARECAAYFAkqwK+AACgkQi+vbBBjt66Cu2gCfQWDWssPUTP+YESUOS7pJXCal TY0An332WH2WDUiF1vhlgOW+QUk9U0rk =S2nD -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4AB02BE0.1030305>