Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 13 Sep 1998 14:33:58 +0200
From:      Stefan Eggers <seggers@semyam.dinoco.de>
To:        Mark Murray <mark@grondar.za>
Cc:        freebsd-security@FreeBSD.ORG, seggers@semyam.dinoco.de
Subject:   Re: Err.. cat exploit.. (!) 
Message-ID:  <199809131234.OAA12240@semyam.dinoco.de>
In-Reply-To: Your message of "Sun, 13 Sep 1998 12:56:16 %2B0200." <199809131056.MAA15702@gratis.grondar.za> 

next in thread | previous in thread | raw e-mail | index | archive | help
> > As I understand it these actions are meant for use in X resources to

> You misunderstand the terminal model.

No, it was specifically about xterm's action string() as was visible
by reading the text I quoted.  My intention was to explain why this
specific thing isn't harmful if used propperly, i.e. only oneself has
access to the X server when logged in.

> Can we put this to sleep now?

For a generic terminal it was at sleep for me already as I know about
the problem for at least a decade.

I just didn't see anybody saying a word about xterm's action string()
and as I know that these things can sometimes be hard to understand I
just wanted to give some help for those trying.

Stefan.
-- 
Stefan Eggers                 Lu4 yao2 zhi1 ma3 li4,
Max-Slevogt-Str. 1            ri4 jiu3 jian4 ren2 xin1.
51109 Koeln
Federal Republic of Germany


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199809131234.OAA12240>