Emacs Inadequate PTY Permissions Vulnerability
BugTraq ID: 2164
Remote: No
Date Published: 2000-12-31
Relevant URL:
http://www.securityfocus.com/bid/2164
Summary:

Emacs is a widely used, freely available text editor, maintained by the
Free Software Foundation. A problem with emacs could allow local users
access to sensitive information.

The problem occurs in the permission settings of the slave terminal. While
running, emacs does not set adequately restrictive permissions on the
slave terminals, making it possible for a user on the local system to
monitor the slave terminals and emacs sessions of other users. It is also
possible for a local user to forge responses to the emacs client. This
issue makes it possible for a malicious user to access information being
edited by other users of emacs, and create forged responses to the emacs
client.

GTK+ Arbitrary Loadable Module Execution Vulnerability
BugTraq ID: 2165
Remote: No
Date Published: 2001-01-02
Relevant URL:
http://www.securityfocus.com/bid/2165
Summary:

GTK+ is the Gimp Toolkit, freely available to the public and maintained by
the GTK Development Team. A problem exists in the Gimp Toolkit that could
allow a user elevated privileges.

The problem occurs in the ability to load modules with the GTK_MODULES
environment variable. It is possible to specify a path to modules that may
not be part of the GTK+ package using this environment variable. By doing
so, a custom crafted module can be loaded by the toolkit. Once loaded by
the toolkit, the module is executed. This issue makes it possible for a
user with malicious intent to potentially gain elevated privileges,
overwrite system files, or execute arbitrary and potentially dangerous
code.


-
Pour poster une annonce: [EMAIL PROTECTED]

Répondre à