[Pkg-shadow-devel] Bug#628843: Bug#628843: login: tty hijacking - suggested solution inclusive patch

Alexander Gattin xrgtn at yandex.ru
Sun Mar 31 12:49:12 UTC 2013


Hello,

On Fri, Mar 29, 2013 at 11:54:21PM +0100, Wolfgang
Zarre wrote:
> I think that in any case the right solution is
> in just flushing the input queue before
> returning to the caller which would not just
> protect in case of hijacking but also of buggy
> applications.

I've successfuly tested an implementation which
keeps the exploit running in the background
_after_ returning control back to rot user. The
running exploit then periodicaly inserts commands
into root terminal, like whoami, rm -rf / etc :)

So flushing the input queue isn't a complete
solution.

-- 
With best regards,
xrgtn
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-shadow-devel/attachments/20130331/d3f390a9/attachment.pgp>


More information about the Pkg-shadow-devel mailing list