New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions
tasankovasara @ tasankovasara @sopuli.xyz Posts 10Comments 158Joined 2 yr. ago

tasankovasara @ tasankovasara @sopuli.xyz
Posts
10
Comments
158
Joined
2 yr. ago
NSFW Deleted
Permanently Deleted
Yes, or SSH keys or any other means of user authentication. The cool thing in this technique is that it's twofold and you (as an attacker) can cherry-pick the info given. If you walk up locally to someone's running system, you could skip the first half and go with the 'hey, can you resize this XFS image for me' bit.