in reply to Doubt in perl taint
By way of explanation, there used to be a security hole on Solaris whereby /usr/bin was installed with permissions of 777 such that running a perl script (using -T) in which access was made to a binary e.g. ls, in the directory, then the script failed taint checking becuase the whole world & his uncle could potentially overwrite the accessed binary.
A subsequent security patch modified the permissions to 755 - at which point perls' taint checking found no problem with the use of the binary (tho' may have found problems elsewhere in the code;-).
For the case I have in mind, the system had both /usr/bin/ls & /bin/ls - where the permissions on /bin were 755 - changing the call from `ls` to `/bin/ls` provided an interim fix.
HTH ,
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^2: Doubt in perl taint
by ikegami (Patriarch) on Dec 13, 2008 at 16:20 UTC | |
by Bloodnok (Vicar) on Dec 13, 2008 at 17:26 UTC | |
by ikegami (Patriarch) on Dec 13, 2008 at 17:31 UTC | |
by Bloodnok (Vicar) on Dec 13, 2008 at 18:21 UTC | |
by ikegami (Patriarch) on Dec 13, 2008 at 18:43 UTC | |
|