This is not so much a vulnerability as an oversight. Who's oversight is up to
you, but if you run a process remotely as root, and it has a GUI, then the GUI
will appear on the screen, as a root process. This usually involves a menubar,
adn thereby access to System Preferences. An easy
if I'm reading this right, it looks like a non-logged in workstation
could be vulnerable to a local root use if an admin is running an remote
install. so the attacker would have to know that a remote operation
is going on and the attacker would need physical access. or I may
just be reading this
It seems so that the attacker needs a ARD enabled user plus vnc
password to access the client.
Then he can send an install command over Manage Send UNIX Command
We're talking about ARD 3.0 so we've got the new feature to lock
client's screen with a message.
From my point of view it's not a
So in order for this vulnerability to be exploited, the attacker needs
to have a local account on the machine correct? Your exploitation explanation
is a bit construed. Any more info / demostrations would be helpful.
-Erik
On 18 Sep 2006 21:26:52 -
[EMAIL PROTECTED] wrote:
Background: