Date: Sat, 12 Sep 1998 13:16:16 +0200 From: Philippe Regnauld <regnauld@deepo.prosa.dk> To: andrew@squiz.co.nz Cc: Jay Tribick <netadmin@fastnet.co.uk>, freebsd-security@FreeBSD.ORG Subject: Re: Err.. cat exploit.. (!) Message-ID: <19980912131616.56832@deepo.prosa.dk> In-Reply-To: <Pine.BSF.3.96.980911052523.4130A-100000@aniwa.sky>; from Andrew McNaughton on Fri, Sep 11, 1998 at 07:39:59AM %2B1200 References: <Pine.BSF.3.96.980910145120.408m-100000@bofh.fast.net.uk> <Pine.BSF.3.96.980911052523.4130A-100000@aniwa.sky>
next in thread | previous in thread | raw e-mail | index | archive | help
Andrew McNaughton writes: > > This is the key point. If you could get something executed merely by > having it passed to a terminal then all sorts of exploits presumably > become possible. They have been for years. I'm sure you can find some horror stories about vtXXX terminals being manipulated with weird esc- sequences. -- -[ Philippe Regnauld / sysadmin / regnauld@deepo.prosa.dk / +55.4N +11.3E ]- The Internet is busy. Please try again later. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980912131616.56832>