>    Unfortunately, we have been hit by a [2]uselib() privilege elevation
>    exploit. As a result, our sysadmins have decided that any CGI/mod_perl
>    process has to run as a specific user instead of as www-data.

I'll admit to not being the best SA or security-minded guy around, so maybe
this is obvious to everyone but me.  nevertheless...  I've read through the
exploit, but I don't follow how changing from one (single) user to other
(multiple) users helps protect against that exploit. maybe there is some way
to trace which specific user ended up doing improper root-ish things?  I
guess that's a reason, though it's not protection.

so, for the betterment of all, what am I missing?

--Geoff

Reply via email to