[21350] in bugtraq
RE: xdm cookies fast brute force
daemon@ATHENA.MIT.EDU (Andrew van der Stock)
Thu Jul 5 14:37:50 2001
From: "Andrew van der Stock" <ajv@e-secure.com.au>
To: <bugtraq@securityfocus.com>
Date: Fri, 6 Jul 2001 00:14:30 +1000
Message-ID: <GLEMLPDJLNNLKLDLMOJEGEGCCAAA.ajv@e-secure.com.au>
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
In-Reply-To: <001301c10455$f3480840$0501a8c0@cd.fr>
This is related to a 1995 CERT advisory:
http://packetstorm.securify.com/advisories/mci/iMCISE:MIIGS:XVUL:1102:95:P1:
R1
It may be a misconfiguration issue, at best. However, since it's been
brought up again, it is worthwhile reexamining the code concerned. Cruft is
bad.
I have forwarded the post to the XFree86 devel group with my two cents.
Andrew
-----Original Message-----
From: Cyril Diakhate [mailto:diakhate@easynet.fr]
Sent: Wednesday, 4 July 2001 16:52
To: bugtraq@securityfocus.com
Subject: xdm cookies fast brute force
##
## advisory for xdm cookies fast brute force
##