wineserver socket file and DOS attacks

Steven Elliott selliott4 at austin.rr.com
Mon May 5 22:20:15 CDT 2008


On Mon, 2008-05-05 at 09:11 +0200, Marcus Meissner wrote:
> On Mon, May 05, 2008 at 08:47:52AM +0200, Francois Gouget wrote:
> > 
> > In /tmp I see the following:
> > 
> >    .X0-lock
> >    .X11-unix/
> >    fgouget/
> >    gconfd-fgouget/
> >    vmware-fgouget/
> >    xmms_fgouget.0
> > 
> > So it seems like if there is a malicious user Wine will not be the only 
> > application that will be affected. So the question is: are all these 
> > apps susceptible to DoS or do they avoid DoS somehow? And if they 
> > prevent DoS, how and is that technique applicable to Wine?
> 
> For gconfd-* gconfd2 creates secondary directories if one is present
> (and checks if its there).
> 
> .X11-unix/ is on suse created during install at least, so no problem.
> 
> No idea about the others.

Good question about other socket files.  I wasn't able to get gconfd to
create secondary files, so creating /tmp/gconfd-<user name> as another
user broke gconf-editor for me.

The .X* files should not be a problem if the X server is started when
the system boots.  But if the system boots up in text mode it's possible
to stop the X server from being started manually (startx) by creating
those directories and by putting bad files in them.

-- 
-----------------------------------------------------------------------
|          Steven Elliott          |      selliott4 at austin.rr.com     |
-----------------------------------------------------------------------





More information about the wine-devel mailing list