Date: Fri, 11 Sep 1998 09:09:43 +0100 (BST) From: Jay Tribick <netadmin@fastnet.co.uk> To: security@FreeBSD.ORG Subject: Re: cat exploit Message-ID: <Pine.BSF.3.96.980911090428.4232A-100000@bofh.fast.net.uk> In-Reply-To: <Pine.GSO.4.02.9809110115070.27098-100000@echonyc.com>
next in thread | previous in thread | raw e-mail | index | archive | help
| > >How about something more practical? Like being able to turn off this | > >"feature". | > | > "rm /bin/cat" ^- Not very practical, it would break a lot of scripts | Cat has little to do with the issue under discussion, despite the | subject line. Escape sequences can come from talk requests, naive | write(1)-like programs or naive network clients (I have seen the first | two, and the third is likely). | | Unless I missed it, nobody has defended the xterm feature in question on | any basis except that that's how it's always been done. I also didn't | notice any reports of recent exploits. | | I'd like to hear a wider variety of opinions on the matter -- in | particular, I wonder if anyone still uses the feature for anything, and | if it's been exploited. I don't understand why you're so dismissive | about it. I think we've had enough replies on this thread - I still think it /may/ be exploitable if you had a . in your path and within the tarball was a file called xtermxterm.. but, let's drop it here before it gets out of hand :) Anyone wants to reply to this, do it privately please. Regards, Jay Tribick <netadmin@fastnet.co.uk> -- [| Network Admin | FastNet International | http://fast.net.uk/ |] [| Finger netadmin@fastnet.co.uk for contact info & PGP PubKey |] [| +44 (0)1273 T: 677633 F: 621631 e: netadmin@fast.net.uk |] To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980911090428.4232A-100000>