Date: Sat, 12 Sep 1998 13:16:16 +0200 From: Philippe Regnauld <regnauld@deepo.prosa.dk> To: andrew@squiz.co.nz Cc: Jay Tribick <netadmin@fastnet.co.uk>, freebsd-security@FreeBSD.ORG Subject: Re: Err.. cat exploit.. (!) Message-ID: <19980912131616.56832@deepo.prosa.dk> In-Reply-To: <Pine.BSF.3.96.980911052523.4130A-100000@aniwa.sky>; from Andrew McNaughton on Fri, Sep 11, 1998 at 07:39:59AM %2B1200 References: <Pine.BSF.3.96.980910145120.408m-100000@bofh.fast.net.uk> <Pine.BSF.3.96.980911052523.4130A-100000@aniwa.sky>
next in thread | previous in thread | raw e-mail | index | archive | help
Andrew McNaughton writes:
>
> This is the key point. If you could get something executed merely by
> having it passed to a terminal then all sorts of exploits presumably
> become possible.
They have been for years. I'm sure you can find some horror
stories about vtXXX terminals being manipulated with weird esc-
sequences.
--
-[ Philippe Regnauld / sysadmin / regnauld@deepo.prosa.dk / +55.4N +11.3E ]-
The Internet is busy. Please try again later.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980912131616.56832>
