User: Password:
|
|
Subscribe / Log in / New account

Spengler: False Boundaries and Arbitrary Code Execution

Spengler: False Boundaries and Arbitrary Code Execution

Posted Mar 3, 2011 7:30 UTC (Thu) by roblucid (subscriber, #48964)
In reply to: Spengler: False Boundaries and Arbitrary Code Execution by gmaxwell
Parent article: Spengler: False Boundaries and Arbitrary Code Execution

I don't like the sound of that idea. What programs can root safely run?
IMO root risks privilege escalation via a trojan, any time they execute non-root owned code.
In past under UNIX, many binaries were owned by 'bin', but this just meant gaining user 'bin' was another way to root the box.


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds