[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
- From: "Rich Stevens" <rstevens34@gmail.com>
- To: plug@lists.phillylinux.org
- Subject: [PLUG] trivia help
- Date: Mon, 9 Jul 2007 19:15:34 -0400
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:mime-version:content-type; b=cYweRptBrIPQzCZtVi3l7DG/amk0A1PLLPk6fE1uwFr7g8krnmd5Rm3nAND2OD2s4LkQM2UAkKh0ai2qUJS2DqVcZMB40IHEsxT21CGEEEs9pQkknfKsLnCcFYb0mVZeLZb6HRB79Ut9IUFIN3MGQOJIEAMIjIx7OanRhVG1Gxg=
- Reply-to: Philadelphia Linux User's Group Discussion List <plug@lists.phillylinux.org>
- Sender: plug-bounces@lists.phillylinux.org
I was reading djb's 2004 MCS 494 final exam (http://cr.yp.to/2004-494/1209.pdf). Problem 2, 5, and 7 really have me going (because i think i understand these scenarios)
"The System administrator arranges for the commands print-new-configs > /tmp/new-configs [ -s /tmp/new-configs ] && ( mail root < /tmp/new-configs ) rm /tmp/new-configs to be run every night. A local user 'joe' creates and runs
gcc -o evil evil.c ./evil after which the system administrator's commands corrupt /etc/passwd. What were the contents of evil.c?"
Any Ideas? Try to only give small hints so that the less gifted of us still have a chance.
___________________________________________________________________________
Philadelphia Linux Users Group -- http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug
|