
Bugtraq mailing list archives
Re: MDKSA-2000:039 - xchat update
From: Decklin Foster <decklin () RED-BEAN COM>
Date: Sat, 26 Aug 2000 03:33:58 -0400
Joey Hess writes:
Actually it is. The "netscape (existing)" and "netscape (new window)" menu entries are safe,
Actually they're vulnerable too. http://drugs.org/just/say/'`yes`' The rule just puts openURL(%s) in single quotes, which can easily be broken out of as in the above pseudo-URL. I'm arguing for the use of execvp instead on the xchat mailing list, we'll see how this goes. It's 3:30 AM and I won't be able to write any code for it until tomorrow. -- There is no TRUTH. There is no REALITY. There is no CONSISTENCY. There are no ABSOLUTE STATEMENTS. I'm very probably wrong. -- BSD fortune(6)
Current thread:
- MDKSA-2000:039 - xchat update Linux Mandrake Security Team (Aug 24)
- Re: MDKSA-2000:039 - xchat update Signal 11 (Aug 25)
- Re: MDKSA-2000:039 - xchat update Joey Hess (Aug 25)
- Re: MDKSA-2000:039 - xchat update Decklin Foster (Aug 28)
- Re: MDKSA-2000:039 - xchat update (xchat-1.4.2-nourltoshell.patch) Anthony Fok (Aug 28)
- Re: MDKSA-2000:039 - xchat update Joey Hess (Aug 25)
- Re: MDKSA-2000:039 - xchat update Signal 11 (Aug 25)
- Re: MDKSA-2000:039 - xchat update Andreas Hasenack (Aug 25)