Why can setting the CentOS 7 SUID bit to s be dangerous?

What will be an ideal response?


This permission can be dangerous because the ability to run someone else's programs allows other users to enjoy the permissions for the duration of the program run. This is how hackers get superuser rights; they break out of the running program and keep the resource permissions.

Computer Science & Information Technology

You might also like to view...

You can embed video ________ code manually into a document

Fill in the blank(s) with correct word

Computer Science & Information Technology

Excel automatically recalculates any formula when the input cells to that _______ are changed.

A. function B. formula C. format D. references

Computer Science & Information Technology

What are some of the features offered by current whole disk encryption tools?

What will be an ideal response?

Computer Science & Information Technology

The set of organizational guidelines that dictates certain behavior within the organization is called __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology