Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 12 Jan 2007 09:42:37 +0100 (CET)
From:      Oliver Fromme <olli@lurza.secnetix.de>
To:        freebsd-questions@FreeBSD.ORG, list@museum.rain.com
Subject:   Re: How dangerous a Standard User could be to a FreeBSD box?
Message-ID:  <200701120842.l0C8gbka070926@lurza.secnetix.de>
In-Reply-To: <20070112003315.GA37679@ns.umpquanet.com>

next in thread | previous in thread | raw e-mail | index | archive | help
James Long wrote:
 > Nathan Vidican wrote:
 > > Gotcha all beat, screw the 'standard user' issue... I had a client call 
 > > me once cause the office cat peed onto/into the server; no technical 
 > > expertise required whatsoever, no password, no re-wiring of network, 
 > > heck no opposable digits even or anything else for that matter, yet it 
 > > still managed to kill the server ;)
 > 
 > Ah yes, the infamous cat(1) ppp(8) exploit.  Much harder to clean up
 > than cat(1) dump(8), too.
 > 
 > Fortunately, the worst problem I've had with mine is occassional 
 > race conditions with mouse(4).

You mean like this one?

http://www.secnetix.de/~olli/fun/cat_and_mouse.jpg

(cat(1) performing a DoS attack on mouse(4).)

Best regards
   Oliver

-- 
Oliver Fromme,  secnetix GmbH & Co. KG, Marktplatz 29, 85567 Grafing
Dienstleistungen mit Schwerpunkt FreeBSD: http://www.secnetix.de/bsd
Any opinions expressed in this message may be personal to the author
and may not necessarily reflect the opinions of secnetix in any way.

"C++ is over-complicated nonsense. And Bjorn Shoestrap's book
a danger to public health. I tried reading it once, I was in
recovery for months."
        -- Cliff Sarginson



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200701120842.l0C8gbka070926>