Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 18 Nov 1998 10:41:08 -0600 (CST)
From:      Aleph One <aleph1@dfw.net>
To:        "David G. Andersen" <danderse@cs.utah.edu>
Cc:        wuebben@kde.org, cert@cert.org, security@FreeBSD.ORG
Subject:   Re: KDE kppp and klock have serious security flaws
Message-ID:  <Pine.SUN.4.01.9811181039481.2797-100000@dfw.nationwide.net>
In-Reply-To: <13906.59901.91263.217800@torrey.cs.utah.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
Roger that. Due note I approved a message earlier today that hints to the
fact that a binary program cannot securely find out where its binary is
located at. Any person should be able to figure out the KHOME exploit in a
snap with that hint.

Aleph One / aleph1@dfw.net
http://underground.org/
KeyID 1024/948FD6B5 
Fingerprint EE C9 E8 AA CB AF 09 61  8C 39 EA 47 A8 6A B8 01 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SUN.4.01.9811181039481.2797-100000>