1 |
On Friday 15 October 2004 05:34 am, Mike Frysinger wrote: |
2 |
>On Friday 15 October 2004 05:37 am, pageexec@××××××××.hu wrote: |
3 |
>> as was said already, it's not an exploit per se, it's a hacking technique |
4 |
>> to stay on an already compromised box. /dev/shm is a tmpfs filesystem, you |
5 |
>> can check your 'mount' output or /etc/fstab. most likely it isn't mounted |
6 |
>> with the noexec (let alone nodev, nosuid, etc) options so it serves as an |
7 |
>> ideal hiding place (as in, many people don't think of it as a general |
8 |
>> purpose storage place). |
9 |
> |
10 |
>on that note, is there any reason to not mount /dev/shm by default with all |
11 |
>these options you listed ? the current Gentoo default fstab mounts it |
12 |
>'defaults' options. |
13 |
|
14 |
touche! |
15 |
|
16 |
-- |
17 |
Eric P. |
18 |
|
19 |
-- |
20 |
gentoo-hardened@g.o mailing list |