Emacs Inadequate PTY Permissions Vulnerability BugTraq ID: 2164 Remote: No Date Published: 2000-12-31 Relevant URL: http://www.securityfocus.com/bid/2164 Summary: Emacs is a widely used, freely available text editor, maintained by the Free Software Foundation. A problem with emacs could allow local users access to sensitive information. The problem occurs in the permission settings of the slave terminal. While running, emacs does not set adequately restrictive permissions on the slave terminals, making it possible for a user on the local system to monitor the slave terminals and emacs sessions of other users. It is also possible for a local user to forge responses to the emacs client. This issue makes it possible for a malicious user to access information being edited by other users of emacs, and create forged responses to the emacs client. GTK+ Arbitrary Loadable Module Execution Vulnerability BugTraq ID: 2165 Remote: No Date Published: 2001-01-02 Relevant URL: http://www.securityfocus.com/bid/2165 Summary: GTK+ is the Gimp Toolkit, freely available to the public and maintained by the GTK Development Team. A problem exists in the Gimp Toolkit that could allow a user elevated privileges. The problem occurs in the ability to load modules with the GTK_MODULES environment variable. It is possible to specify a path to modules that may not be part of the GTK+ package using this environment variable. By doing so, a custom crafted module can be loaded by the toolkit. Once loaded by the toolkit, the module is executed. This issue makes it possible for a user with malicious intent to potentially gain elevated privileges, overwrite system files, or execute arbitrary and potentially dangerous code. - Pour poster une annonce: [EMAIL PROTECTED]
