Imagine this... One linux system maintained by admin. I do not have root access but I can create and edit fles. Admin runs virus scan. I create an exploit file. It exploits virus scan. I get the privileges of the user running the virus scan.
--- Harry Muchow <[EMAIL PROTECTED]> wrote: > > V - EXPLOIT CODE > > > > An exploit for this vulnerability has been > developed but will not > > released to the general public at this time. > > Don't ever release that to general public. Why would > we like to run rm > -rf / in such a funny way? I can type the command in > the shell if all > I want to do is attack myself. ;-) > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: > http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - > http://secunia.com/ > ____________________________________________________________________________________ Sick sense of humor? Visit Yahoo! TV's Comedy with an Edge to see what's on, when. http://tv.yahoo.com/collections/222 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
