On Jun 24, 08 01:09:38 -0400, Eric Garrido wrote: > I'm of the opinion that this isn't a valiant method of publicizing an > "exploit", but care more about the end than the means. > > This appears to be fixed in HEAD, or at least, I can't immediately > reproduce it out of the tree. I'll bisect it tomorrow. > > Eric > > On Mon, Jun 23, 2008 at 11:12 AM, rembrandt <[EMAIL PROTECTED]> wrote: > > As posted to the OpenBSD Mailinglist this is a problem is propably more > > related to you directly. > > > > I made an update to the following Advisory after people in the CERTS (I > > wont mention any here..) because a lot claimed it's a fake/myth. > > > > http://marc.info/?l=openbsd-ports&m=121422445904683&w=2
This exploit exploits that the user neglected to set a screen password and did not read the manual. I appreciate any suggestions on how to improve user education here. Patching the screen attacher process to ignore EINTR can only have an effect if - screen uses screen_builtin_lck() and - is compiled without PAM support (not recommended). The suggested patch is harmless, but indicates that tty initialization on OpenBSD fails. cheers, Jw. -- o \ Juergen Weigert paint it green! __/ _=======.=======_ <V> | [EMAIL PROTECTED] __/ _---|____________\/ \ | 0911 74053-508 (tm)__/ (____/ /\ (/) | __________________________/ _/ \_ vim:set sw=2 wm=8 SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)