On Tue, Jan 15, 2013 at 10:45 PM, Dominik Maier <[email protected]> wrote:

> Only issue I could think of is that it could be used to escalate permissions
> of an attacker to swath's user's context. Then again, the system already has
> to be infiltrated to do that...

So, it's still possible to exploit by explicitly invoking swath mule mode
in some scripts or so. I think I'll fix this.

Regards,
-- 
Theppitak Karoonboonyanan
http://linux.thai.net/~thep/


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to