Geoffrey Young <[EMAIL PROTECTED]> writes:
>> Unfortunately, we have been hit by a [2]uselib() privilege elevation
>> exploit. As a result, our sysadmins have decided that any CGI/mod_perl
>> process has to run as a specific user instead of as www-data.
>
> I'll admit to not being the best SA or security-minded guy around, so maybe
> this is obvious to everyone but me. nevertheless... I've read through the
> exploit, but I don't follow how changing from one (single) user to other
> (multiple) users helps protect against that exploit.
me either
> maybe there is some way to trace which specific user ended up doing
> improper root-ish things? I guess that's a reason, though it's not
> protection.
yes, it certainly just lets us narrow down who led to it and nothing else.
> >
> so, for the betterment of all, what am I missing?
nothing, as far as I can see :)
> >
> --Geoff
>
--
Carter's Compass: I know I'm on the right track when,
by deleting something, I'm adding functionality.