Bugtraq mailing list archives
Re: Sending escape sequences to xterms via wall/talk
From: jmc () gnu ai mit edu (jmc () gnu ai mit edu)
Date: Wed, 20 Jul 1994 15:28:21 -0400 (EDT)
Of course having a sym link in your file space along the lines of: core -> /dev/rsd0a and as xterm runs as root, is also a good way of breaking your machine...setuid programs don't produce core dumps; it's a security feature.
Wanna bet? I've gotten them to do this under Solaris before. I'm gonna have to go see if I can find an example, but I remember getting fusage to core under 2.2 fairly easily. James
Current thread:
- Re: Is starting a user program on priv port via inetd dangerous ?, (continued)
- Re: Is starting a user program on priv port via inetd dangerous ? jmc () gnu ai mit edu (Jul 22)
- yes, there's another hole in BIND Paul A Vixie (Jul 21)
- Re: yes, there's another hole in BIND Resident Hacker (Jul 22)
- Re: yes, there's another hole in BIND Paul A Vixie (Jul 22)
- Re: yes, there's another hole in BIND Perry E. Metzger (Jul 22)
- Re: yes, there's another hole in BIND Pat Myrto (Jul 22)
- Re: yes, there's another hole in BIND David Barr (Jul 22)
- Re: yes, there's another hole in BIND Joe Hentzel (Jul 22)
- *PLEASE* shut up Dave Sill (Jul 22)
- Re: Is starting a user program on priv port via inetd dangerous ? Graham Toal (Jul 22)
- Re: Sending escape sequences to xterms via wall/talk jmc () gnu ai mit edu (Jul 20)
- root name server corruption, denial of service prob Mark (Jul 21)
- Re: root name server corruption, denial of service prob Mark Kosters (Jul 21)
- Re: Escape sequences (was Wall and talkd pass binary data) Bruce Barnett (Jul 20)
- Re: Wall and talkd pass binary data G.J.W. Hagenaars (Jul 20)