TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Remote LD_PRELOAD Exploitation

36 点作者 pentestercrab超过 7 年前

2 条评论

londons_explore超过 7 年前
The unix security model of &quot;you have to know how it works to make it secure&quot; is starting to show it&#x27;s issues...<p>Clearly, the author of this code thought of environment variables as any other kind of variable - a simple key-value map, which can have any keys and any values.<p>The fact that there are special keys and special values is just insane. Either environment variables should be a general purpose key value map, with no special values, or it should have <i>all</i> special values, pre-allocated keys which don&#x27;t allow collisions, or not allow custom definitions at all.<p>There are lots of cases of this across unix-like OS&#x27;s. For example &quot;directories contain a special entry called &#x27;..&#x27; which goes up a level&quot; or &quot;TCP ports under 1024 are &#x27;special&#x27;.<p>This is, in my opinion, poor API design, and we&#x27;re paying for it now in the form of bugs and security issues.
half-kh-hacker超过 7 年前
Wow - Using stdin as the LD_PRELOAD target seems super obvious in retrospect, now.<p>Good job to the author(s).