Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Sep 1998 09:09:43 +0100 (BST)
From:      Jay Tribick <netadmin@fastnet.co.uk>
To:        security@FreeBSD.ORG
Subject:   Re: cat exploit 
Message-ID:  <Pine.BSF.3.96.980911090428.4232A-100000@bofh.fast.net.uk>
In-Reply-To: <Pine.GSO.4.02.9809110115070.27098-100000@echonyc.com>

next in thread | previous in thread | raw e-mail | index | archive | help

| > >How about something more practical? Like being able to turn off this
| > >"feature".
| > 
| > "rm /bin/cat"

        ^- Not very practical, it would break a lot of scripts

| Cat has little to do with the issue under discussion, despite the
| subject line.  Escape sequences can come from talk requests, naive
| write(1)-like programs or naive network clients (I have seen the first
| two, and the third is likely).
| 
| Unless I missed it, nobody has defended the xterm feature in question on
| any basis except that that's how it's always been done.  I also didn't
| notice any reports of recent exploits.
| 
| I'd like to hear a wider variety of opinions on the matter -- in
| particular, I wonder if anyone still uses the feature for anything, and
| if it's been exploited.  I don't understand why you're so dismissive
| about it.

I think we've had enough replies on this thread - I still think it
/may/ be exploitable if you had a . in your path and within the
tarball was a file called xtermxterm.. but, let's drop it here
before it gets out of hand :)

Anyone wants to reply to this, do it privately please.

Regards,

Jay Tribick <netadmin@fastnet.co.uk>
--
[| Network Admin | FastNet International | http://fast.net.uk/ |]
[| Finger netadmin@fastnet.co.uk for contact info & PGP PubKey |]
[|   +44 (0)1273 T: 677633 F: 621631 e: netadmin@fast.net.uk   |]



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980911090428.4232A-100000>