On Wednesday 30 August 2006 01:45, Alex Merry wrote:
> On Tue, Aug 29, 2006 at 11:33:26PM +0400, Vladimir A. Pavlov wrote:
> > I mean a user able to read a file can disassemble it and find
> > security holes in it.
>
> Although it would probably be easier to download the sources and look
> at those...

An attacker doesn't know exactly what optimization flags and/or patches 
were applied by an administrator when building ping (or another 
S[UG]ID) executable. For example, AFAIK RedHat uses lots of patches 
some of which aren't really necessary.

Some patches (and I think CFLAGS/LDFLAGS) can cause different errors in 
the application that were absent in the original source (or, in the 
case of *FLAGS, that were invisible if compiling without optimization) 
so it's more reliable to use the binary rather than the source. As well 
as it's _much_ more harder to.

-- 
Nothing but perfection
pv
-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to