On Sun, Mar 02, 2008 at 05:01:06PM -0800, Andrew Sackville-West wrote:
> On Sun, Mar 02, 2008 at 04:32:26PM -0800, David Fox wrote:
> > On 3/2/08, Andrew Sackville-West <[EMAIL PROTECTED]> wrote:
 
> Anyway, that's the whole point of an exploit -- providing some
> _thing_, data or code, that causes a privilege escalation. It doesn't
> have to be a helper running as root, just a helper that can be
> exploited in some manner to get a root escalation. At least that's
> what I understand. 

Do the standard virus checkers (is it ClamAV?) find such problems before
an exploit in mutt/helper is found or fixed?

I never read email from X, always from a VT (or a vt520).  If something
comes in from someone I don't know and it contains an image, I delete
it; if it contains html, I read it myself and if I'm really curious I'll
open it with lynx when disconnected from the internet (I'm on dialup).
Any other attachements from people I don't know get deleted too.  If I
get an unknown attachement from someone I do know, I'll send them a note
saying "what is this?".

I never read mail as root, it all gets redirected to me, dtutty.  OTOH,
dtutty is in lots of groups: ssh, adm, staff so something nasty could do
some harm.  Note that for surfing the net with javascript or flash, I
use the user dtbrowser which is in no special groups and has nothing
secret in /home/dtbrowser.

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to