On Wed, 2005-09-28 at 09:48 -0400, Tushar Teredesai wrote:
> On 9/28/05, Simon Geard <[EMAIL PROTECTED]> wrote:
> > Doesn't matter. If a malicious package can already install to
> > directories in $PATH, it can replace or override an existing program
> > already being run by the scripts you're trying to secure.
> >
> > For instance, one of the first things /etc/rc.d/init.d/rc does is run
> > 'stty sane'.  Replace the stty command with a something malicious, and
> > it doesn't matter how well secured the boot scripts are.
> 
> As per the pkg-user hint, one pkg cannot overwrite a file that is
> owned by another pkg. But what it can do is to install an indentically
> named executable in a different location. For example, it can install
> /usr/bin/stty which may be executed ahead of /bin/stty depending on
> the PATH settings.

Yes, that's what I was thinking of - not replacing the executable on
disk, but placing a new version where it will override the original.
Looking at my scripts, a malicious command at /sbin/stty would be
executed ahead of the normal one at /bin/stty, for example.

Simon.

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
http://linuxfromscratch.org/mailman/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to