in reply to Tiger Security Administration Program
Dunno for sure that that would work but it probably would be a better idea. Parsing out the filename from the crontab entry is potentially complicated and could miss similar attack vectors (ie ok maybe the altered executable doesn't get executed via cron but the victim user runs it by hand not realizing that someone else has altered it).
And as suggested, this question probably fits better on a security forum (check out the mailing lists at securityfocus.com, for instance).
|
|---|