Greg Lopp on Fri, 1 Jun 2001 15:10:05 -0400 |
On Fri, Jun 01, 2001 at 02:11:37PM -0400, Tim Peeler wrote: > If one were to use the init section of an elf header to execute > arbritrary code (for example someone created a worm/virus that > planted arbitrary code into the init section), would the init > section be executed with the permissions of the user executing the > code or would it be executed with the permissions of the loader? By no means an authoritative answer : Logic would dictate that the init section is executed with euid permissions. If it were the other, there would really be no security as gaining the loader's permission level would be trivial. You wouldn't need a worm/virus to plant arbitrary code in the init section of an elf executable, you could do it yourself to your own hello_world.c program. But who would this loader be anyway? Wouldn't the loader just be your shell process makeing an exec() system call? ______________________________________________________________________ Philadelphia Linux Users Group - http://www.phillylinux.org Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce General Discussion - http://lists.phillylinux.org/mail/listinfo/plug
|
|