[15391] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Fwd: Re: Splitvt exploit

daemon@ATHENA.MIT.EDU (Thomas Biege)
Tue Jun 20 04:26:50 2000

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.LNX.4.05.10006200831270.15347-100000@Galois.suse.de>
Date:         Tue, 20 Jun 2000 08:36:11 +0200
Reply-To: Thomas Biege <thomas@SUSE.DE>
From: Thomas Biege <thomas@SUSE.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <00061920562900.05142@wintermute>

Hi,

> > splitvt isn't installed setuid on SuSE Linux.
>
> So how does it work?
>
> If it's not setuid, and has not been patched to use devpts, it has no
> way of chowning the tty's it uses. That means that when you run splitvt,
> you are typing into a shell that is connected to a tty that is
> (typically) mode:
>
> crw-rw-rw-    1 root     tty        3, 176 Jun 14 14:53 /dev/ttya0
>
> Thus, third parties can eg, write escape sequences to the terminal, and
> possibly remap keystrokes to do evil things. And they can certianly
> capture your keystokes to that terminal.

Yes, you're right.

We're currently testing splitvt with the /dev/pts stuff.... thanks for
that hint.



Bye,
     Thomas
--
  Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
  E@mail: thomas@suse.de      Function: Security Support & Auditing
  "lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka"
   Key fingerprint = 09 48 F2 FD 81 F7 E7 98  6D C7 36 F1 96 6A 12 47

home help back first fref pref prev next nref lref last post