Lack of informations about the flaw of the use of sudo
Alberto Salvia Novella
es20490446e at gmail.com
Thu Sep 22 10:46:45 UTC 2016
Edgard Schmidt:
> The attacker could edit the users ".bashrc" file and insert the
> following line: alias sudo='bash ~/.malware/fake-sudo.sh'
That's true, if the attacker could gain write permissions to any file in
the user's directory.
The problem is that in practise this is highly improbable. Modern
browsers design is compartmentalized, which means no function access
directly the file system but does using a common interface.
That interface only allows to write in the web browser configuration
folder. Only when you download files the browser does differently and
allows to download anywhere, and always interactively with the person
sat in front of the screen.
In the past there were problems with plug-ins, like Flash and Java,
because those sometimes allowed themselves to write anywhere. They were
the main source of exploits, but these days they are run in a sand-boxed
file system. Moreover they are planned to be deprecated.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4747 bytes
Desc: S/MIME Cryptographic Signature
URL: <https://lists.ubuntu.com/archives/ubuntu-doc/attachments/20160922/df41ddc0/attachment.bin>
More information about the ubuntu-doc
mailing list