Kernel core dumps (was Re: out of swap space??)
david.r.connet
dcon at cbnewsc.att.com
Fri May 17 00:44:19 AEST 1991
In article <3909 at d75.UUCP> marc at ekhomeni.austin.ibm.com (Marc Wiz) writes:
>> I only played with it briefly, but it looked like the debugger could be
>> a security hole. You could bring up a debugger session without being
>> logged on, and probably poke a 0 into the appropriate place in your
>> uarea...
>Yes that is true that you can poke a 0 into the appropriate place.
>However IMHO one of the biggest problems with the debugger was that you
>only had addressability to the current process.
>
>If you wanted to look around in another process' address space you were
>in for an interesting time. The debugger didn't have that capability.
>
With AT&Ts debugger, you can basically do anything you want to the system.
The only security you have is physical, i/o is done with the console.
More information about the Comp.unix.sysv386
mailing list