Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Another essential step is to drop superuser privileges permanently after these calls . (See see POS02-C. Follow the principle of least privilege). ) The chroot() system call is not secure against the superuser changing the current root directory (if privileges are not dropped). Successful jail creation prevents unintentional file system access even if an attacker gives malicious input, such as through command-line arguments.

...

Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

POS05-C

mediumMedium

probableProbable

highHigh

P4

L3

Automated Detection

ToolVersionCheckerDescription
CodeSonar
Include Page
CodeSonar_V
CodeSonar_V
BADFUNC.CHROOTUse of chroot

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines

...

.

...

Bibliography

...