On Thursday 14 November 2013 00:50:33 Piotr Grzybowski wrote:
>  I can think of an attack, just provide me with ip address of the host
> :) and a root account password and login :)
> 
>  I agree that most systems have other abilities to do the (almost)
> same, but yet, all systems (that is to say many more than have nc)
> have bash, and while roots on those will expect netcat to be able to
> open listen sockets they do not necessarily expect bash to do the
> same.
>  My main point is: this patch means that every user that has access to
> who-knows-how restricted shell can open listen sockets, and unless
> someone thought of using grsecurity to deny access to bind(2) it is
> unrestricted.
as Joel said, the functionality he is adding does not impact the attack vector 
at all.  bash already has networking functionality built into it.

>  This feature should at least be switchable, or otherwise restricted.

it already is via a configure flag: --disable-net-redirections
-mike

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to