Gentoo Archives: gentoo-hardened

From: "Tóth Attila" <atoth@××××××××××.hu>
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] Interesting: CVE-2012-0056
Date: Tue, 24 Jan 2012 08:34:08
Message-Id: 45b392a7f0cf6fd1683029964ee88111.squirrel@atoth.sote.hu
In Reply to: Re: [gentoo-hardened] Interesting: CVE-2012-0056 by pageexec@freemail.hu
1 2012.Január 24.(K) 08:26 időpontban pageexec@××××××××.hu ezt írta:
2 > On 24 Jan 2012 at 2:35, Francesco R.(vivo) wrote:
3 >
4 >> BTW this in "vanilla" gentoo does not work because of the permission of
5 >> the su
6 >> file:
7 >> ls -l /usr/bin/su
8 >> -rws--x--x 1 root root 36776 18 gen 21.31 /usr/bin/su
9 >>
10 >> readelf cannot read the address, but there can be other ways to access
11 >> the
12 >> binary for example for group "disk"
13 >
14 > http://seclists.org/fulldisclosure/2012/Jan/396
15 >
16 >> hardened gentoo is un-affected as expected (but you already know)
17 >
18 > this is not quite true, what could work against grsec is an exploit that
19 > implemented a ret2libc style exploit coupled with bruteforcing (if the
20 > target suid is a PIE). i hope you're all enabling the bruteforce
21 > protection
22 > feature in grsec ;).
23
24 My only concern against bruteforce protection is the possiblity of a DoS.
25 But it's always better to get DoSed, than to get bruteforced...
26 --
27 dr Tóth Attila, Radiológus, 06-20-825-8057
28 Attila Toth MD, Radiologist, +36-20-825-8057

Replies

Subject Author
Re: [gentoo-hardened] Interesting: CVE-2012-0056 Kevin Chadwick <ma1l1ists@××××××××.uk>