Gentoo Archives: gentoo-hardened

From: Mike Frysinger <vapier@g.o>
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] Exploitable Weakness: Shared Memory
Date: Fri, 15 Oct 2004 12:34:55
Message-Id: 200410150834.42508.vapier@gentoo.org
In Reply to: Re: [gentoo-hardened] Exploitable Weakness: Shared Memory by pageexec@freemail.hu
1 On Friday 15 October 2004 05:37 am, pageexec@××××××××.hu wrote:
2 > as was said already, it's not an exploit per se, it's a hacking technique
3 > to stay on an already compromised box. /dev/shm is a tmpfs filesystem, you
4 > can check your 'mount' output or /etc/fstab. most likely it isn't mounted
5 > with the noexec (let alone nodev, nosuid, etc) options so it serves as an
6 > ideal hiding place (as in, many people don't think of it as a general
7 > purpose storage place).
8
9 on that note, is there any reason to not mount /dev/shm by default with all
10 these options you listed ?
11 the current Gentoo default fstab mounts it 'defaults' options
12 -mike
13
14 --
15 gentoo-hardened@g.o mailing list

Replies

Subject Author
Re: [gentoo-hardened] Exploitable Weakness: Shared Memory Eric Pretorious <ericp@××.net>
Re: [gentoo-hardened] Exploitable Weakness: Shared Memory pageexec@××××××××.hu