Date: Tue, 01 Oct 2002 17:36:51 -0600 From: Brett Glass <brett@lariat.org> To: "f.johan.beisser" <jan@caustic.org> Cc: security@FreeBSD.ORG Subject: Re: tar/security best practice (was Re: RE: Is FreeBSD's tar susceptible to this?) Message-ID: <4.3.2.7.2.20021001173317.034cfe10@localhost> In-Reply-To: <20021001162006.C67581-100000@pogo.caustic.org> References: <4.3.2.7.2.20021001170815.0345ab20@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
At 05:25 PM 10/1/2002, f.johan.beisser wrote: >sadly, i have to admit that won't work, not without adding in the leading >"/". remember that "~" is expanded to "/home/$USER". I was using the ~ notation as a shorthand. The point is that if you can get at a user's .forward file, that's sufficient to run code as him/her. There are lots of other clever ways, too; that's just the first example that came to mind. Rather than give someone the opportunity to find a clever exploit, I think we'd best just close the hole. ;-) --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20021001173317.034cfe10>
