Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 01 Oct 2002 17:36:51 -0600
From:      Brett Glass <brett@lariat.org>
To:        "f.johan.beisser" <jan@caustic.org>
Cc:        security@FreeBSD.ORG
Subject:   Re: tar/security best practice (was Re: RE: Is FreeBSD's tar   susceptible to this?)
Message-ID:  <4.3.2.7.2.20021001173317.034cfe10@localhost>
In-Reply-To: <20021001162006.C67581-100000@pogo.caustic.org>
References:  <4.3.2.7.2.20021001170815.0345ab20@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
At 05:25 PM 10/1/2002, f.johan.beisser wrote:

>sadly, i have to admit that won't work, not without adding in the leading
>"/". remember that "~" is expanded to "/home/$USER". 

I was using the ~ notation as a shorthand. The point is that if you can
get at a user's .forward file, that's sufficient to run code as him/her.
There are lots of other clever ways, too; that's just the first
example that came to mind.

Rather than give someone the opportunity to find a clever exploit, I think
we'd best just close the hole. ;-)

--Brett


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20021001173317.034cfe10>