1 |
2012.Január 24.(K) 08:26 időpontban pageexec@××××××××.hu ezt írta: |
2 |
> On 24 Jan 2012 at 2:35, Francesco R.(vivo) wrote: |
3 |
> |
4 |
>> BTW this in "vanilla" gentoo does not work because of the permission of |
5 |
>> the su |
6 |
>> file: |
7 |
>> ls -l /usr/bin/su |
8 |
>> -rws--x--x 1 root root 36776 18 gen 21.31 /usr/bin/su |
9 |
>> |
10 |
>> readelf cannot read the address, but there can be other ways to access |
11 |
>> the |
12 |
>> binary for example for group "disk" |
13 |
> |
14 |
> http://seclists.org/fulldisclosure/2012/Jan/396 |
15 |
> |
16 |
>> hardened gentoo is un-affected as expected (but you already know) |
17 |
> |
18 |
> this is not quite true, what could work against grsec is an exploit that |
19 |
> implemented a ret2libc style exploit coupled with bruteforcing (if the |
20 |
> target suid is a PIE). i hope you're all enabling the bruteforce |
21 |
> protection |
22 |
> feature in grsec ;). |
23 |
|
24 |
My only concern against bruteforce protection is the possiblity of a DoS. |
25 |
But it's always better to get DoSed, than to get bruteforced... |
26 |
-- |
27 |
dr Tóth Attila, Radiológus, 06-20-825-8057 |
28 |
Attila Toth MD, Radiologist, +36-20-825-8057 |