Creation of chroot Jail Without Changing Working Directory
Description The program uses the chroot() system call to create a jail, but does not change the working directory afterward. This does not prevent access to files outside of the jail. Extended DescriptionImproper use of chroot() may allow attackers to escape from the chroot jail. The chroot() function call does not change the process's current working directory, so relative paths may still refer to file system resources outside of the chroot jail after chroot() has been called. Likelihood of Exploit: High Applicable PlatformsLanguage: CLanguage: C++Operating System Class: UNIX Time Of Introduction
Common Consequences
Detection MethodsNone Potential MitigationsNone Relationships
Demonstrative Examples (Details) White Box Definitions None Black Box Definitions None Taxynomy Mappings
References:None |