Date: Wed, 18 Nov 1998 10:41:08 -0600 (CST) From: Aleph One <aleph1@dfw.net> To: "David G. Andersen" <danderse@cs.utah.edu> Cc: wuebben@kde.org, cert@cert.org, security@FreeBSD.ORG Subject: Re: KDE kppp and klock have serious security flaws Message-ID: <Pine.SUN.4.01.9811181039481.2797-100000@dfw.nationwide.net> In-Reply-To: <13906.59901.91263.217800@torrey.cs.utah.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
Roger that. Due note I approved a message earlier today that hints to the fact that a binary program cannot securely find out where its binary is located at. Any person should be able to figure out the KHOME exploit in a snap with that hint. Aleph One / aleph1@dfw.net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SUN.4.01.9811181039481.2797-100000>