Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 12 Sep 1998 13:16:16 +0200
From:      Philippe Regnauld <regnauld@deepo.prosa.dk>
To:        andrew@squiz.co.nz
Cc:        Jay Tribick <netadmin@fastnet.co.uk>, freebsd-security@FreeBSD.ORG
Subject:   Re: Err.. cat exploit.. (!)
Message-ID:  <19980912131616.56832@deepo.prosa.dk>
In-Reply-To: <Pine.BSF.3.96.980911052523.4130A-100000@aniwa.sky>; from Andrew McNaughton on Fri, Sep 11, 1998 at 07:39:59AM %2B1200
References:  <Pine.BSF.3.96.980910145120.408m-100000@bofh.fast.net.uk> <Pine.BSF.3.96.980911052523.4130A-100000@aniwa.sky>

next in thread | previous in thread | raw e-mail | index | archive | help
Andrew McNaughton writes:
> 
> This is the key point.  If you could get something executed merely by
> having it passed to a terminal then all sorts of exploits presumably
> become possible. 

	They have been for years.  I'm sure you can find some horror
	stories about vtXXX terminals being manipulated with weird esc-
	sequences.

-- 
 -[ Philippe Regnauld / sysadmin / regnauld@deepo.prosa.dk / +55.4N +11.3E ]-

               The Internet is busy.  Please try again later.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980912131616.56832>