-----BEGIN PGP SIGNED MESSAGE-----

On 02-Sep-99 Taneli Huuskonen wrote:

> +  snprintf(command, sizeof(command)-1, "mv %s %s 2>&1 >/dev/null" , oldname,
> newname);
>    return(system(command));
>  }
>
> Without seeing the context, I can't say for sure, but this looks like a
> hole big enough to drive a truck through  -  calling system( ) with
> user-supplied arguments.  If this code is running with superuser
> privileges and shell metacharacters haven't been removed very carefully,
> there's going to be a trivial exploit.

oh, i've looked at the code and function that contains that system() isn't ever
used. :)

- ---
* Fido: 2:480/124 ** WWW: FreeBSD.lublin.pl/~venglin ** GSM: +48-601-383657 *
* Inet: [EMAIL PROTECTED] ** PGP: D48684904685DF43 EA93AFA13BE170BF *

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBN8/209O5/yfsePq1AQHydQQAjQP1B1/Y5n11dSP3KreHlchiCOmuFPDC
3/SA+nTMrKBidcO/j37Mm/3biy9SkDmSSnn+EdKZwuCMH8BZ4CUrp6CdQzPwBJ8r
oJxcotzFHf3D/ojhhC89PsGfIGJ+L1QJiOuTLFltlJU1eOis8VhIQclT+0eNWVhM
g1sgF/mJaXE=
=SDuc
-----END PGP SIGNATURE-----

Reply via email to