From owner-freebsd-security Thu Sep 10 10:44:24 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id KAA13668 for freebsd-security-outgoing; Thu, 10 Sep 1998 10:44:24 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from echonyc.com (echonyc.com [198.67.15.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id KAA13662 for ; Thu, 10 Sep 1998 10:44:22 -0700 (PDT) (envelope-from benedict@echonyc.com) Received: from localhost by echonyc.com (8.9.1/8.9.1) with SMTP id NAA21297; Thu, 10 Sep 1998 13:44:03 -0400 (EDT) Date: Thu, 10 Sep 1998 13:44:03 -0400 (EDT) From: Snob Art Genre Reply-To: ben@rosengart.com To: Jay Tribick cc: security@FreeBSD.ORG Subject: Re: cat exploit In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, 10 Sep 1998, Jay Tribick wrote: > That's exactly what I was saying - just for example, say your installing > something as root you usually cat the file INSTALL to find out what > you need to do - it would be relatively simple to embed a command > in there to just rm -rf / & your hd! 1) No, you use less. 2) So you've figured out how to execute arbitrary commands from this? I'm not saying that's not possible, but so far the only thing this "bug" does is output the name of xterm. Ben "You have your mind on computers, it seems." To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message