Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 27 Aug 1998 20:37:16 +0000
From:      Niall Smart <rotel@indigo.ie>
To:        Nicholas Charles Brawn <ncb05@uow.edu.au>, freebsd-security@FreeBSD.ORG
Subject:   Re: trusted path execution patch
Message-ID:  <199808271937.UAA01055@indigo.ie>
In-Reply-To: <Pine.SOL.4.02A.9808260223120.247-100000@banshee.cs.uow.edu.au>; Nicholas Charles Brawn <ncb05@uow.edu.au>

next in thread | previous in thread | raw e-mail | index | archive | help
On Aug 26,  2:32am, Nicholas Charles Brawn wrote:
} Subject: trusted path execution patch

> For those not familiar with route's patch (Phrack 52, article 6), it
> limits the execution of binaries to those in directories designated as
> "trusted". That being (in this case), those that aren't writable by
> group or other, and are owned by either root, bin, or have the gid of a
> "trusted" group.

So are you going to audit all those utilities in the trusted path
for buffer overflows?

Niall

-- 
Niall Smart, rotel@indigo.ie.
Amaze your friends and annoy your enemies:
echo '#define if(x) if (!(x))' >> /usr/include/stdio.h

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199808271937.UAA01055>