Some older kernels contain a vulnerability that allows a local user to gain root privileges. Explain how this kind of vulnerability negates the value of a chroot jail.

What will be an ideal response?


If a malicious user can compromise a daemon running in a chroot jail so that
she can execute code on the server, then she might be able to gain root
access. Once she has root access, the malicious user can escape from the
chroot jail.

Many administrators fail to install patches that eliminate local root vulner-
abilities on server systems. The logic behind this nonaction is that no one
except the administrator has local root access to the server. These adminis-
trators fail to realize that a service can turn a local root exploit into a remote
root exploit.

Computer Science & Information Technology

You might also like to view...

The __________ __________ makes passes through an array, comparing consecutive pairs of elements and interchanging them if they are not in the correct order.

Fill in the blank(s) with correct word

Computer Science & Information Technology

How many times should you press the Tab key to line up text?

What will be an ideal response?

Computer Science & Information Technology

If copies are sent to more than one individual, align the names at the 0.5" default tab.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

How many archive logs are maintained for a virtual machine at any one time?

A. two B. four C. six D. eight

Computer Science & Information Technology