Greg Lopp on Fri, 1 Jun 2001 15:10:05 -0400


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] ELF Init section


On Fri, Jun 01, 2001 at 02:11:37PM -0400, Tim Peeler wrote:
>    If one were to use the init section of an elf header to execute
>    arbritrary code (for example someone created a worm/virus that
>    planted arbitrary code into the init section), would the init
>    section be executed with the permissions of the user executing the
>    code or would it be executed with the permissions of the loader?

By no means an authoritative answer :

Logic would dictate that the init section is executed with euid
permissions.  If it were the other, there would really be no
security as gaining the loader's permission level would be
trivial.  You wouldn't need a worm/virus to plant arbitrary code
in the init section of an elf executable, you could do it
yourself to your own hello_world.c program.  

But who would this loader be anyway?  Wouldn't the loader just be
your shell process makeing an exec() system call?


______________________________________________________________________
Philadelphia Linux Users Group       -      http://www.phillylinux.org
Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce
General Discussion  -  http://lists.phillylinux.org/mail/listinfo/plug