Re: LD_PRELOAD attack

2008-06-11 Thread michael graffam
On Wed, Jun 11, 2008 at 3:56 PM, David Shaw <[EMAIL PROTECTED]> wrote: > If the attacker had access to your machine to implement the LD_PRELOAD > attack, there are literally dozens of ways they can similarly steal > whatever data they are trying to steal. Why do a very complex attack > involving

Re: LD_PRELOAD attack

2008-06-11 Thread michael graffam
Thing and check environment sanity. -M On 6/11/08, Robert J. Hansen <[EMAIL PROTECTED]> wrote: > michael graffam wrote: >> Has anyone read the article in the most recent 2600 regarding using >> LD_PRELOAD to eavesdrop on gnupg? > > My reaction to it has been to yawn.

Re: LD_PRELOAD attack

2008-06-11 Thread michael graffam
cessfully hides itself from calls to getenv, and ignore attempts to unset env vars. Manually walking the environment pointer reveals it, of course. On 6/11/08, Alexander W. Janssen <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > michael graf

LD_PRELOAD attack

2008-06-11 Thread michael graffam
Has anyone read the article in the most recent 2600 regarding using LD_PRELOAD to eavesdrop on gnupg? I realize that the actual recovery of a passphrase by this means is no better than keylogger -- But what concerns me more (and isn't explicitely covered in the article) is the ability to inject f