You are not logged in.
Pages: 1
According to this page it's damn simple to get keystrokes from X even from non root account, and someone wrote a program to fast decrypt the keystroke sequences. Maybe a workaround should be to stop running xinput from non root users. What do you think about it?
Edit: the Wirenet trojan is probably using this "feature" to keylog strokes, but thinking, may a chmod that removes read and execute permission for group and others from the /usr/bin/xinput executable mitigate this security hole?
Last edited by utopyand (2012-09-14 08:09:39)
Offline
I give a
chmod 700 /usr/bin/xinputhope doesn't harm my system (but i lsed the previous permissions on a file, just for...)
Last edited by utopyand (2012-09-14 08:18:01)
Offline
chmod would only be helpful if xinput were previously e.g. suid root. But it ain't!
Malicious apps can just copy what xinput does.
Edit: Here's a good Ubuntu summary bug.
The freedesktop bug says:
We already have an XSECURITY extension (and have had for years) which allows you to specify policies such as these in a SecurityPolicy file.
So that's something to check out...
Last edited by brebs (2012-09-14 10:23:46)
Offline
Pages: 1