2014-02-17 21:49 GMT+01:00 Marc Espie <es...@nerim.net>:
> On Mon, Feb 17, 2014 at 07:48:44PM +0000, Miod Vallat wrote:
>> >                          Attacks with LD_PRELOAD are very old and can
>> > be performed on any OS where you have dynamic linking (Linux, *BSD
>> > etc.), so yes, OpenBSD is "vulnerable" to this type of stuff.
>>
>> You forgot to mention that the value of LD_PRELOAD is ignored for set*id
>> executables, in order to prevent these kind of games.
>>
>> Miod
>
> Last time I've seen abuse of LD_PRELOAD was with the "on" binary on
> SunOS.   Of course, that predated any kind of security, as on was
> a stupid RPC program without any kind of setuid that simply "trusted"
> getuid() on the client host.
>
> That was a bit like shooting fish in the barrel, it was about the same
> time NFS earned its true name (Notreally a File System)...
>
> To put things in perspective, that was roughly 20 years ago.

At least on linux this type of abuse seem to be still (very) effective:

http://blackhatlibrary.net/LD_PRELOAD
http://blackhatlibrary.net/Azazel

and of course PAM:

http://blackhatlibrary.net/Hooking_PAM

Daniel

Reply via email to