.plan

Fuat C. Baran fuat at cunixc.cc.columbia.edu
Fri Aug 25 07:25:05 AEST 1989


In article <10814 at smoke.BRL.MIL> gwyn at brl.arpa (Doug Gwyn) writes:
>If "finger" really does dump the contents of .plan literally to a terminal,
>then you could exploit that misfeature to force-feed one of the terminal's
>programmable function keys, then dump it back.  That's a good way to run
>commands under somebody else's UID!  This would be a security hole that
>needs to be fixed.

It's not really finger that needs to be fixed, but the terminal.
There should be a way to lock out reprogramming of function keys, etc.
in a setup menu.  People using such terminals should be aware of the
risks.  Otherwise, all you need to do is put a file called
/tmp/PLEASE-README, and wait for someone with the right terminal (and
capabilities) to cat it.  And that isn't a security hole in cat...

						--Fuat
-- 
INTERNET: fuat at columbia.edu          U.S. MAIL: Columbia University
BITNET:   fuat at cunixc.cc.columbia.edu           Center for Computing Activities
USENET:   ...!rutgers!columbia!cunixc!fuat      712 Watson Labs, 612 W115th St.
PHONE:    (212) 854-5128                        New York, NY 10025



More information about the Comp.unix.questions mailing list