Well, I'll be damned! (or should I say infiltrated)

Anton.

> Hi Anton,
> 
> I just ran REBOL/View from my REBOL home directory to test the
> default install behavior. I was able to rename rebol.exe to
> another file name (blah.bak) and then write out a random file
> downloaded from a remote web site to a file named rebol.exe .
> You don't have to delete the file for this exploit to work.
> This is a major security hole. And yes, I was on Windows XP.

> Brian Hawley

-- 
To unsubscribe from this list, just send an email to
[EMAIL PROTECTED] with unsubscribe as the subject.

Reply via email to