[Pkg-shadow-devel] Bug#628843: Bug#628843: login: tty hijacking - suggested solution inclusive patch
Alexander Gattin
xrgtn at yandex.ru
Sun Mar 31 12:49:12 UTC 2013
Hello,
On Fri, Mar 29, 2013 at 11:54:21PM +0100, Wolfgang
Zarre wrote:
> I think that in any case the right solution is
> in just flushing the input queue before
> returning to the caller which would not just
> protect in case of hijacking but also of buggy
> applications.
I've successfuly tested an implementation which
keeps the exploit running in the background
_after_ returning control back to rot user. The
running exploit then periodicaly inserts commands
into root terminal, like whoami, rm -rf / etc :)
So flushing the input queue isn't a complete
solution.
--
With best regards,
xrgtn
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-shadow-devel/attachments/20130331/d3f390a9/attachment.pgp>
More information about the Pkg-shadow-devel
mailing list