No root-compromising security holes
severity 24898 normal
quit
After a quick audit of the code, I do not believe that there are any
security holes in cfingerd that could be use to compromise root.
There are potentials for buffer-overflows. However, none of them
involve any potentially tainted data -- they involve reading config
files and the like -- data that only root could supply to cfingerd
anyway. Therefore, I set severity to this to normal.
Thanks,
John
--
John Goerzen Linux, Unix consulting & programming jgoerzen@complete.org |
Developer, Debian GNU/Linux (Free powerful OS upgrade) www.debian.org |
----------------------------------------------------------------------------+
Visit the Air Capital Linux Users Group on the web at http://www.aclug.org
--
To UNSUBSCRIBE, email to debian-devel-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Reply to: