PaulDotCom mailing list archives
Re: [Security Weekly] Unix Wildcards gone wild
From: c1b3rh4ck <c1b3rh4ck () gmail com>
Date: Thu, 3 Jul 2014 23:54:28 -0500
Hi , actually with some coreutils doesn't work as it is mentioned in your blog you need to check Linux Secure Packaging Policy by Dmitry Levin. Best Regards , Hector J. 2014-06-25 19:22 GMT-05:00 Jamil Ben Alluch <jamil () autronix com>:
Hello, I just stumbled upon this article: http://blog.defensecode.com/2014/06/back-to-future-unix-wildcards-gone-wild.html (more of a text file actually). It exposes vulnerabilities with unix shell scripting wildcards. I haven't had time to test it out yet but I think it would be worth looking into within your environment. Best Regards, *--* *Jamil Ben Alluch, ing. jr, GCIH* [image: Autronix] <http://www.autronix.com> *Information Technology & Security Consulting* jamil () autronix com +1-819-923-3012 +1-877-564-7656 e.123 ᐧ _______________________________________________ securityweekly mailing list securityweekly () mail securityweekly com http://mail.securityweekly.com/cgi-bin/mailman/listinfo/securityweekly Main Web Site: http://pauldotcom.com
-- *Quien se infiltra en la oscuridad ,es Quien encuentra la verdad .Lao Tse * Debian User Penetration Testing Entusiasta Seguridad Informatica :-D LinuxUser #506301 ------------------------------------ Puffy Loves
_______________________________________________ securityweekly mailing list securityweekly () mail securityweekly com http://mail.securityweekly.com/cgi-bin/mailman/listinfo/securityweekly Main Web Site: http://pauldotcom.com
Current thread:
- [Security Weekly] Unix Wildcards gone wild Jamil Ben Alluch (Jul 02)
- Re: [Security Weekly] Unix Wildcards gone wild c1b3rh4ck (Jul 09)