Re: Process system call access list.

2005-01-16 Thread Willy Tarreau
Hi, On Sun, Jan 16, 2005 at 02:00:22PM -0500, Bill Pringlemeir wrote: > > [please CC me.] > > I was looking at phrack and many of the remote exploits rely on > injecting some arbitrary code. Generally is is something like > 'exec("/bin/sh")' or something like that. > > I was wondering if a sec

Process system call access list.

2005-01-16 Thread Bill Pringlemeir
[please CC me.] I was looking at phrack and many of the remote exploits rely on injecting some arbitrary code. Generally is is something like 'exec("/bin/sh")' or something like that. I was wondering if a section could be added to the link phase of a user application that would keep a list/bit