tl;dr: Yes, this is remotely exploitable. Longer explanation:
It is if and only if you use a terminal emulator that implements various exploitable escape sequences *and* cat/tail files that an attacker can write to, even indirectly, such as webserver access logs. For various attack vectors, read this: http://marc.info/?l=bugtraq&m=104612710031920 If you're super-paranoid, don't "tail -f" access log files or other files that an attacker can write to through accessing a service on your system. Get into the habit of "cat -v $FILENAME" to make sure non-printable characters are escaped, intead of being fed unfiltered to your terminal program. On 9/9/10 10:47 AM, Jade Rubick wrote: > Did I read this correctly: this is a remotely exploitable? -- Dossy Shiobara | do...@panoptic.com | http://dossy.org/ Panoptic Computer Network | http://panoptic.com/ "He realized the fastest way to change is to laugh at your own folly -- then you can let go and quickly move on." (p. 70) -- AOLserver - http://www.aolserver.com/ To Remove yourself from this list, simply send an email to <lists...@listserv.aol.com> with the body of "SIGNOFF AOLSERVER" in the email message. You can leave the Subject: field of your email blank.