On Sun, 4 Feb 2001, Martin Schulze wrote: > Please tell me what you gain from this. man does not run setuid > root/man but only setgid man. So all you can exploit this to is a > shell running under your ownl user ide. sucker admins who m4 their sendmail.mc's as root, chiefly if you trick them into processing an untrusted and untrustworthy .mc file. ____________________________ jose nazario [EMAIL PROTECTED] PGP: 89 B0 81 DA 5B FD 7E 00 99 C3 B2 CD 48 A0 07 80 PGP key ID 0xFD37F4E5 (pgp.mit.edu)
- SuSe / Debian man package format string vulnerabilit... Joao Gouveia
- Re: SuSe / Debian man package format string vul... Roman Drahtmueller
- Re: SuSe / Debian man package format string vul... Tomasz Kuźniar
- m4 format string vulnerability [was: Re: Su... Mike Gerber
- Re: m4 format string vulnerability [was... Ivo van Poorten
- Re: m4 format string vulnerability Jarno Huuskonen
- Re: SuSe / Debian man package format string vul... StyX
- Re: SuSe / Debian man package format string... Martin Schulze
- Re: SuSe / Debian man package format st... Jose Nazario
- Re: SuSe / Debian man package forma... Nate Eldredge
- Re: SuSe / Debian man package format st... Robert Bihlmeyer
- Re: SuSe / Debian man package format string... Robert van der Meulen
- Re: SuSe / Debian man package format st... Valdis Kletnieks
- Re: SuSe / Debian man package format st... Ethan Benson
- Re: SuSe / Debian man package format st... John
- Re: SuSe / Debian man package forma... Megyer Ur
- Re: SuSe / Debian man package ... Foldi Tamas
- Re: SuSe / Debian man package forma... Andreas Ferber
- Re: SuSe / Debian man package forma... Graham Hughes