[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: chown32() weirdness
Just checked it. No problem with setuid exploit. Permissions are
stripped on chown, and you're not allowed to setuid afterwards.
-Walt
Walt H wrote:
> I was more afraid of the setuid, possibe local root exploit. Maybe that
> would be caught?
>
> -Walt
>
>
> Wessel Dankers wrote:
>
>> On 2002-02-18 11:02:51-0600, Eric Sandeen wrote:
>>
>>> Ok, I guess this is a difference between Irix and Linux...
>>>
>>
>> Hm. That means I can just push someone over their quota by chowning a big
>> file to them (especially if it's in a directory they do not have access
>> to). That doesn't sound right.
>>
>> Regards,
>>
>> --
>> Wessel Dankers <wsl@fruit.eu.org>
>>
>> Some one needed the powerstrip, so they pulled the switch plug.
>>
>>
>
>