Today, I discovered by accident that having setuid option set on
xorg-server -- which is the default option -- may be dangerous. (I guess
you all knew that already :-).

Another logged in user "killed" my screen by typing:

X :1

After turning setuid off, this denial of service attack was not possible
anymore. To be honest, I was really surprised that a regular user with
no special permissions can disrupt other people's x11 sessions that
easily.

Although, let me be precise here. It seems to be that he actually opened
another X11 session (which is the idea of this command I guess).
However, none of those sessions were displayed anymore on the screen.

Am I missing anything in my security configuration? What do you think?

Cheers,
Carlo



_______________________________________________
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscr...@freebsd.org"

Reply via email to