[17543] in bugtraq

home help back first fref pref prev next nref lref last post

Re: vulnerability in mail.local

daemon@ATHENA.MIT.EDU (Robert Bihlmeyer)
Tue Nov 7 13:52:37 2000

Mime-Version: 1.0
Content-Type: multipart/signed; boundary="----------=_973607469-763-4";
              micalg="pgp-sha1"; protocol="application/pgp-signature"
Message-Id:  <87zojbonvu.fsf@hoss.orcus.priv.at>
Date:         Tue, 7 Nov 2000 15:30:45 +0100
Reply-To: Robert Bihlmeyer <robbe@ORCUS.PRIV.AT>
From: Robert Bihlmeyer <robbe@ORCUS.PRIV.AT>
X-To:         bert hubert <ahu@DS9A.NL>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  bert hubert's message of "Mon, 6 Nov 2000 20:02:24 +0100"

This is a multi-part message in MIME format.
It has been signed conforming to RFC2015.
You'll need PGP or GPG to check the signature.

------------=_973607469-763-4
Content-Type: text/plain; charset=us-ascii

bert hubert <ahu@DS9A.NL> writes:

> [2] Getting input into /dev/tty requires wizardry that's not supposed to be
> available to general users

The wizardry you're talking about is called "pseudo ttys" and needs no
special privileges. Peruse the code of X terminal emulators for
examples.

--
Robbe

------------=_973607469-763-4
Content-Type: application/pgp-signature; name="signature.ng"
Content-Disposition: inline; filename="signature.ng"
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6CBIw8g21h7wYWrMRAj/uAKCspitNfm84+2sqA/v+fp0HtnVLRQCfTT6z
VuNhOKWSDUcN70MQyZGk8aU=
=2dxn
-----END PGP SIGNATURE-----

------------=_973607469-763-4--

home help back first fref pref prev next nref lref last post