1 |
On Friday 15 October 2004 05:37 am, pageexec@××××××××.hu wrote: |
2 |
> as was said already, it's not an exploit per se, it's a hacking technique |
3 |
> to stay on an already compromised box. /dev/shm is a tmpfs filesystem, you |
4 |
> can check your 'mount' output or /etc/fstab. most likely it isn't mounted |
5 |
> with the noexec (let alone nodev, nosuid, etc) options so it serves as an |
6 |
> ideal hiding place (as in, many people don't think of it as a general |
7 |
> purpose storage place). |
8 |
|
9 |
on that note, is there any reason to not mount /dev/shm by default with all |
10 |
these options you listed ? |
11 |
the current Gentoo default fstab mounts it 'defaults' options |
12 |
-mike |
13 |
|
14 |
-- |
15 |
gentoo-hardened@g.o mailing list |