|
IRIX disk_bandwidth Vulnerability
Solution: SGI recommends changing the permissions of the disk_bandwidth program to allow execution only by system administrators. Removing the setuid bit, and restricting the file permissions to allow only for execution by root, or those in a specific group will eliminate this vulnerability, so long as these users do not have '.' as the first element in their path; this would allow an attacker to possibly still perform the attack, by waiting for the administrator to execute the program in a specific directory. # chmod 500 /sbin/disk_bandwidth |
|
Privacy Statement |