Date: Fri, 12 Jan 2007 09:42:37 +0100 (CET) From: Oliver Fromme <olli@lurza.secnetix.de> To: freebsd-questions@FreeBSD.ORG, list@museum.rain.com Subject: Re: How dangerous a Standard User could be to a FreeBSD box? Message-ID: <200701120842.l0C8gbka070926@lurza.secnetix.de> In-Reply-To: <20070112003315.GA37679@ns.umpquanet.com>
next in thread | previous in thread | raw e-mail | index | archive | help
James Long wrote: > Nathan Vidican wrote: > > Gotcha all beat, screw the 'standard user' issue... I had a client call > > me once cause the office cat peed onto/into the server; no technical > > expertise required whatsoever, no password, no re-wiring of network, > > heck no opposable digits even or anything else for that matter, yet it > > still managed to kill the server ;) > > Ah yes, the infamous cat(1) ppp(8) exploit. Much harder to clean up > than cat(1) dump(8), too. > > Fortunately, the worst problem I've had with mine is occassional > race conditions with mouse(4). You mean like this one? http://www.secnetix.de/~olli/fun/cat_and_mouse.jpg (cat(1) performing a DoS attack on mouse(4).) Best regards Oliver -- Oliver Fromme, secnetix GmbH & Co. KG, Marktplatz 29, 85567 Grafing Dienstleistungen mit Schwerpunkt FreeBSD: http://www.secnetix.de/bsd Any opinions expressed in this message may be personal to the author and may not necessarily reflect the opinions of secnetix in any way. "C++ is over-complicated nonsense. And Bjorn Shoestrap's book a danger to public health. I tried reading it once, I was in recovery for months." -- Cliff Sarginson
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200701120842.l0C8gbka070926>