logoalt Hacker News

charcircuittoday at 12:32 AM2 repliesview on HN

The remote daemon has its own account and is given a privilege that allows it to connect a network socket to a pseudo terminal.


Replies

direwolf20today at 12:57 AM

Those are already unprivileged operations, but how does it start the initial process in that terminal with the correct privileges for a different user?

show 1 reply
essephtoday at 12:40 AM

Any breach of the daemon will still give access to a system that can approve/deny user logins. Breaching the daemon therefore allows permission escalation, because you can simply jump to an account. Chain with any local vuln of your choice to completely own the box.

It doesn't matter what user it is running as.

If this was so easy to deal with, someone would have done it. Instead, we get endless HN comments about people that act like they can do better but never submit a PR.

show 1 reply