TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Remote LD_PRELOAD Exploitation

36 pointsby pentestercrabover 7 years ago

2 comments

londons_exploreover 7 years ago
The unix security model of &quot;you have to know how it works to make it secure&quot; is starting to show it&#x27;s issues...<p>Clearly, the author of this code thought of environment variables as any other kind of variable - a simple key-value map, which can have any keys and any values.<p>The fact that there are special keys and special values is just insane. Either environment variables should be a general purpose key value map, with no special values, or it should have <i>all</i> special values, pre-allocated keys which don&#x27;t allow collisions, or not allow custom definitions at all.<p>There are lots of cases of this across unix-like OS&#x27;s. For example &quot;directories contain a special entry called &#x27;..&#x27; which goes up a level&quot; or &quot;TCP ports under 1024 are &#x27;special&#x27;.<p>This is, in my opinion, poor API design, and we&#x27;re paying for it now in the form of bugs and security issues.
half-kh-hackerover 7 years ago
Wow - Using stdin as the LD_PRELOAD target seems super obvious in retrospect, now.<p>Good job to the author(s).