Timeline for How do real and effective user IDs work?
Current License: CC BY-SA 3.0
4 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Oct 30, 2011 at 23:08 | comment | added | David Schwartz | @starcron: Yes. In fact, may attacks are demonstrated by showing how to use that attack to create a setuid root shell. | |
| Oct 30, 2011 at 9:02 | comment | added | starcorn | I wondering in context of the stack smashing attack technique. Where malicious hacker opens up a shell with superuser level. | |
| Oct 30, 2011 at 9:00 | comment | added | starcorn | So in the case of I open a shell setting the uid to 0 (using setreuid), so that the effective uid will be root but the real uid is still me. Since I don't think the shell specifically has something built in which prevent me, does it mean I get access to the whole system then? | |
| Oct 30, 2011 at 2:45 | history | answered | David Schwartz | CC BY-SA 3.0 |