tl;dr: Yes, this is remotely exploitable.

Longer explanation:

It is if and only if you use a terminal emulator that implements various
exploitable escape sequences *and* cat/tail files that an attacker can
write to, even indirectly, such as webserver access logs.

For various attack vectors, read this:

http://marc.info/?l=bugtraq&m=104612710031920

If you're super-paranoid, don't "tail -f" access log files or other
files that an attacker can write to through accessing a service on your
system.  Get into the habit of "cat -v $FILENAME" to make sure
non-printable characters are escaped, intead of being fed unfiltered to
your terminal program.


On 9/9/10 10:47 AM, Jade Rubick wrote:
> Did I read this correctly: this is a remotely exploitable?

-- 
Dossy Shiobara              | do...@panoptic.com | http://dossy.org/
Panoptic Computer Network   | http://panoptic.com/
  "He realized the fastest way to change is to laugh at your own
    folly -- then you can let go and quickly move on." (p. 70) 


--
AOLserver - http://www.aolserver.com/

To Remove yourself from this list, simply send an email to 
<lists...@listserv.aol.com> with the
body of "SIGNOFF AOLSERVER" in the email message. You can leave the Subject: 
field of your email blank.

Reply via email to