BugTraq
DLL hijacking on Linux Aug 24 2010 11:26PM
Tim Brown (timb nth-dimension org uk) (1 replies)
Re: DLL hijacking on Linux Aug 25 2010 08:37PM
Pavel Kankovsky (peak argo troja mff cuni cz)
On Wed, 25 Aug 2010, Tim Brown wrote:

> the key point is that an empty directory specification statement in
> LD_LIBRARY_PATH, PATH (and probably others) is equivalent to $CWD.

And there is also the infamous DT_RPATH (and DT_RUNPATH) that makes it
possible to hardwire unsafe paths into executable files themselves.
This happens quite often and I find it very disturbing.

--
Pavel Kankovsky aka Peak / Jeremiah 9:21 "For death is come up into our MS Windows(tm)..." \ 21st century edition /

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus