Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: New Remote Windows Exploit (MS04-029)
From: Rodrigo Barbosa <rodrigob () suespammers org>
Date: Thu, 4 Nov 2004 18:09:48 -0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, Nov 04, 2004 at 02:24:53PM -0500, Valdis.Kletnieks () vt edu wrote:
2) An amazing amount of stuff assumes that /tmp has 'exec' - at
least for a while, 'rpmbuild' of a Redhat Perl would die because it
build into a directory on /tmp, and then tried to run a binary out
of that just-built tree - workaround was to feed rpm a '%_tmpdir ='
pointing elsewhere.  Dell's microcode installer hits the same issue,
as did at least some OpenOffice builds.

So if you do it, be prepared to get bit, and have to do a
'mount -o remount,exec /tmp' once in a while...

I'm not sure which standard (FHS ? LSB ?), but these softwares should
honor the TMPDIR environment. And yes, /tmp is the fallback, in case
$TMPDIR is not set.

- -- 
Rodrigo Barbosa <rodrigob () suespammers org>
"Quid quid Latine dictum sit, altum viditur"
"Be excellent to each other ..." - Bill & Ted (Wyld Stallyns)

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFBioyMpdyWzQ5b5ckRAh5XAJwK4MwSDrw7959Q++vHI0gJwS/cgQCgwlfe
xyQfcnE7h7WykMPOta7cofg=
=SMHC
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]