[4357] in bugtraq
xlock clarification....
daemon@ATHENA.MIT.EDU (David Hedley)
Mon Apr 28 19:53:08 1997
Date: Mon, 28 Apr 1997 13:30:08 +0100
Reply-To: David Hedley <hedley@CS.BRIS.AC.UK>
From: David Hedley <hedley@CS.BRIS.AC.UK>
To: BUGTRAQ@NETSPACE.ORG
Just to clarify the xlock problem for people (as I've received email
from several people who aren't sure if they're vulnerable or not). The
length of the parameter has to exceed 1024 bytes (as the buffer being
overflowed is 1024 characters). e.g. try: xlock -name xxxxx<insert 1000+x's>
Regards,
David
--
David Hedley (hedley@cs.bris.ac.uk)
finger hedley@cs.bris.ac.uk for PGP key
Computer Graphics Group | University of Bristol | UK