On Tue, Oct 29, 2013 at 12:46 PM, Naoya Anzai <anzai-na...@mxu.nes.nec.co.jp> wrote: > Hi Sandeep > >> I think, you should change the subject line to "Unquoted service path >> containing space is vulnerable and can be exploited on Windows" to get the >> attention.. :) > Thank you for advice! > I'll try to post to pgsql-bugs again.
I could also reproduce this issue. The situation is very rare such that an "exe" with name same as first part of directory should exist in installation path. I suggest you can post your patch in next commit fest. With Regards, Amit Kapila. EnterpriseDB: http://www.enterprisedb.com -- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers