Cory Petkovsek wrote:

> I can see the situation wherein I "ssh -X remote_server" and then load
> xcalc.  The remote X application is running on the remote server and
> sending the display to my machine.  I can then see how the superuser on
> the remote machine could potentially read my input and output
> interraction with xcalc.
> 
> However, how can the remote superuser access my input and output
> interraction with a locally running app?

The attacker could run this on the remote machine.

    # env XAUTHORITY=/home/coryp/.Xauthority \
    >     xwd -display localhost:10 -root > picture-of-corys-screen.xwd

That takes a snapshot of your screen.

I don't know of an off-the-shelf invisible X keyboard sniffer, but
it's not too hard to write an X client that puts up an input only
window that covers the whole screen, then asks for all keyboard events
while the focus is anywhere on the screen.

The point is, an attacker can run arbitrary X clients on your display,
if he has superuser privileges on the remote host.  Those X clients
can read and write your screen and can read your keyboard.

-- 
Bob Miller                              K<bob>
kbobsoft software consulting
http://kbobsoft.com                     [EMAIL PROTECTED]
_______________________________________________
EuG-LUG mailing list
[EMAIL PROTECTED]
http://mailman.efn.org/cgi-bin/listinfo/eug-lug

Reply via email to