[4357] in bugtraq

home help back first fref pref prev next nref lref last post

xlock clarification....

daemon@ATHENA.MIT.EDU (David Hedley)
Mon Apr 28 19:53:08 1997

Date: 	Mon, 28 Apr 1997 13:30:08 +0100
Reply-To: David Hedley <hedley@CS.BRIS.AC.UK>
From: David Hedley <hedley@CS.BRIS.AC.UK>
To: BUGTRAQ@NETSPACE.ORG

Just to clarify the xlock problem for people (as I've received email
from several people who aren't sure if they're vulnerable or not). The
length of the parameter has to exceed 1024 bytes (as the buffer being
overflowed is 1024 characters). e.g. try: xlock -name xxxxx<insert 1000+x's>

Regards,

David
--
 David Hedley (hedley@cs.bris.ac.uk)
 finger hedley@cs.bris.ac.uk for PGP key
 Computer Graphics Group | University of Bristol | UK

home help back first fref pref prev next nref lref last post