[23163] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Digital Unix CDE dtaction vulnerability concept of proof code

daemon@ATHENA.MIT.EDU (Dan Stromberg)
Thu Nov 15 21:08:04 2001

Date: Thu, 15 Nov 2001 14:39:08 -0800
From: Dan Stromberg <strombrg@nis.acs.uci.edu>
To: SeungHyun Seo <s1980914@inhavision.inha.ac.kr>
Cc: bugtraq <bugtraq@securityfocus.com>
Message-ID: <20011115143908.G2037@seki.acs.uci.edu>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
	protocol="application/pgp-signature"; boundary="n7Uw1KoBlYAJvhhj"
Content-Disposition: inline
In-Reply-To: <Pine.OSF.3.95.1011116055336.11203C-100000@inhavision.inha.ac.kr>; from s1980914@inhavision.inha.ac.kr on Fri, Nov 16, 2001 at 05:59:30AM +0900

--n7Uw1KoBlYAJvhhj
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

DEC released a patch for dtaction a while back.

Is this exploiting the vulnerability the patch fixed, or a new
vulnerability?

On Fri, Nov 16, 2001 at 05:59:30AM +0900, SeungHyun Seo wrote:
>=20
>=20
> Digital Unix 4.0d CDE dtaction vulnerability exploitable.
> concept of proof code follows

--=20
Dan Stromberg                                               UCI/NACS/DCS

--n7Uw1KoBlYAJvhhj
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE79EQMo0feVm00f/8RAi8iAJ9fqgIlI0RSljraZbv1oZwZlh7vcwCeK6Xy
6YiCOMFfxoKRSSvdeSF5Rg8=
=2jlv
-----END PGP SIGNATURE-----

--n7Uw1KoBlYAJvhhj--

home help back first fref pref prev next nref lref last post