Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 26 Jul 2005 18:07:22 -0500
From:      Lane <lane@joeandlane.com>
To:        freebsd-questions@freebsd.org
Subject:   Re: cat /dev/urandom
Message-ID:  <200507261807.23024.lane@joeandlane.com>
In-Reply-To: <d4b4435a050726153552b7de7@mail.gmail.com>
References:  <20050726183029.M97284@neptune.atopia.net> <d4b4435a050726153552b7de7@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tuesday 26 July 2005 17:35, Michael Beattie wrote:
> On 7/26/05, Matt Juszczak <matt@atopia.net> wrote:
> > Hi all,
> >
> > Quick question.
> >
> > shell# cat /dev/urandom
> >
> > can that executed as root cause any harm to the system?  What if a random
> > sequence of `rm *` was generated... would it be executed?
> >
> > I tried that to fix my terminal and forgot it might cause damage as root,
> > even if its just being cat'd to the screen.  I thought I saw some files
> > fly by which would indicate an execution of `ls`....
> >
> > Just curious....
>
> If you had a file with an rm * in it and you cat'd it would it execute?
> _______________________________________________
That's a good answer, but what if the command was:

`cat /dev/urandom`

could /dev/urandom generate arbitrary and potentially executable code?

I'm curious, too

lane



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200507261807.23024.lane>