Re: Arbitrary Code Execution Vulnerability in VanDyke SecureCRT 3.4 & 4.0 beta

2002-07-29 Thread Jim Paris
> Thanks (and to Jim Paris). > > I of course did not mean that it was OK for the client to have code > injection "portholes". I just meant that the particular exploit path > that was described wasn't very interesting since someone who maliciously > controls t

Applications can open up remote root access on G1 Phone

2008-11-05 Thread Jim Paris
Hi, Google Android applications on the T-Mobile G1 can spawn a telnetd that gives remote root access to your phone: http://www.android-unleashed.com/2008/11/howto-get-root-on-your-android-g1-and.html This particular method needs user interaction, but a rogue Android app could easily run telnetd

Re: Applications can open up remote root access on G1 Phone

2008-11-06 Thread Jim Paris
I wrote: > Google Android applications on the T-Mobile G1 can spawn a telnetd > that gives remote root access to your phone: > > http://www.android-unleashed.com/2008/11/howto-get-root-on-your-android-g1-and.html > > This particular method needs user interaction, but a rogue Android app > could e

Re: /proc filesystem allows bypassing directory permissions on Linux

2009-10-30 Thread Jim Paris
> > 0700 mode from the origin, you would be right, and procfs wouldn't allow > > opening files in that directory too, but if you let others to traverse > > that directory and open your believed to be secure files from the origin, > > it's your fault. > > I can do the example with fd passing and

Re: /proc filesystem allows bypassing directory permissions on Linux

2009-10-30 Thread Jim Paris
Marco Verschuur wrote: > Your assumption that the same file descriptor is being re-opened is > wrong! The file descriptor retrieved via /proc is a new one. It is > not the same as the initial read-only. Yes, I totally agree. > Therefor it's totally of no influence what you do with the original