[4354] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Perl System Call HACKS

daemon@ATHENA.MIT.EDU (James B. Davis)
Tue Feb 11 14:39:08 1997

Date: Tue, 11 Feb 1997 09:37:06 -0600
From: james@odie.tci.com (James B. Davis)
To: jeffm@sgiserv3.aws.waii.com, www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu


> 
> Is there a FAQ or information giving some examples as to the way
> a perl script that executes sendmail via a PERL system call can
> be hacked?
> 
> What strings are going to be malicious to the sendmail execution?
> Is there a work-around?
> 
> You may eMail me directly at jeff.middleton@waii.com.
> 
> Thanks in advance.
> 

For perl, gander at the CPAN of your choice (or via www.perl.org)
and scan for the MailTools modules. There are demos in the pkg
and nice documentation.  You can send, forward and reply till the
cows come home. Nifty. Neato. Nuff said.

james

---
James B. Davis
Sr. System Administrator       _/_/_/_/_/  _/_/  _/_/_/
TELE-COMMUNICATIONS, Inc.         _/    _/    _/  _/
AIT Southern Data Center         _/    _/        _/
1776 N Greenville Ave           _/    _/        _/
Richardson, TX  75081          _/    _/    _/  _/
(972) 907-4003                _/      _/_/  _/_/_/
Operations (972) 907-4100 - FAX (972) 907-4005
mailto:davis.james@tci.com http://www.tci.com/~james

home help back first fref pref prev next nref lref last post