Yes.  I saw the posting to the kde list by Alan Cox, I believe it was.  I
wonder if you, or another Debianite, could tell me just how easy it would
be to attach to a tcp port and send/recv commands to take advantage of
that security hole?  I know a programmer would have no trouble exploiting
this.  What about the common Joe?

And don't flame me.  I think it should be fixed as well, ofcourse.  I just
want to get an idea of how threatening it is.  If anybody can do it by
telneting to the tcp port that's a major problem.  If it takes a special
program to take advantage of it, then that's not something I would expect
to see happen to me before the fix is done.

I didn't get the whole dialog that Alan and he were having but I assume
the guy will make haste in fixing the problem after being shot down like
that.  Evidently he didn't know Alan was a kernel developer.

Anyway, thanks for the info.  I got it from incoming at master.

On 6 May 1997, Steve Dunham wrote:

> Rick Jones <[EMAIL PROTECTED]> writes:
> 
> > What package is libgif2 in?  It's needed to install the kde packages.
> 
> You know there is a huge security hole in kfm....(which the author
> apparently doesn't care to fix...) It uses a tcp socket to send
> commands (like delete file) to it's slave processes...So essentially
> (if you're on the net) anyone in the world can delete files on your
> machine... 
> 
> "libgif2" is the name of the package. Look for it in 
>    hamm/hamm/binary-i386/devel
> (I don't know if it's been installed yet.)
> 
> 
> Steve
> [EMAIL PROTECTED]
> 

--Rick

[EMAIL PROTECTED]


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .

Reply via email to