The /proc vulnerability
The /proc vulnerability
Posted Jul 20, 2006 6:39 UTC (Thu) by ekj (guest, #1524)In reply to: The /proc vulnerability by sweikart
Parent article: The /proc vulnerability
noexe pretty much doesn't do anything.
If it's a script of some sort, then it simply means you need to type "python foo.py" instead of "./foo.py" (substitute your favourite interpreter).
If it's a executable, you only need to type "/lib/ld.so program" instead of "./program"
Really. Any program that can be executed from a normal filesystem can just as well be executed, perhaps at the cost of 10 extra keystrokes, from a noexe mounted filesystem.
