Some older kernels contain a vulnerability that allows a local user to gain root privileges. Explain how this kind of vulnerability negates the value of a chroot jail.
What will be an ideal response?
If a malicious user can compromise a daemon running in a chroot jail so that
she can execute code on the server, then she might be able to gain root
access. Once she has root access, the malicious user can escape from the
chroot jail.
Many administrators fail to install patches that eliminate local root vulner-
abilities on server systems. The logic behind this nonaction is that no one
except the administrator has local root access to the server. These adminis-
trators fail to realize that a service can turn a local root exploit into a remote
root exploit.
You might also like to view...
Data that is displayed in a cell is called the ________ value
Fill in the blank(s) with the appropriate word(s).
________ in some operating systems are well known by some people, and they are more than capable of testing systems to see if one is open
Fill in the blank(s) with correct word