Quite intersting.
One solution is limit those people who don't need shell access to false
shells to go around this weak passwd problem.

But even with strong passwds I have seen machines with the root user
removed by a hacker!

Kiggs

On Tue, 2004-10-12 at 07:50, joseph mpora wrote:
> Sorry if this was already posted.
> 
> --------
> Using a stolen password, Mallory managed to log into an important server
> running Linux. The account was a very limited account, but Mallory knew
> how to cause trouble with it. Mallory installed and ran a trivial
> program with very odd behavior -- it quickly created and removed many
> different symbolic link files in the /tmp directory, using a multitude
> of processes. (A symbolic link file, also called a symlink, is simply a
> file that when accessed redirects the requester to another file.)
> Mallory's program kept creating and removing many different symlinks
> pointing to the same special file: /etc/passwd, the password file.
> 
> -----
> Full story here
> 
> http://www-106.ibm.com/developerworks/linux/library/l-sprace.html?ca=dgr-lnxw07RACE
> 
> ------------
> 
> Joseph
> 
> 
> _______________________________________________
> LUG mailing list
> [EMAIL PROTECTED]
> http://kym.net/mailman/listinfo/lug
> %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
> 

_______________________________________________
LUG mailing list
[EMAIL PROTECTED]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

Reply via email to