lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20050602100803.GA14767@var.cx>
Date: Thu, 2 Jun 2005 12:08:03 +0200
From: Frank v Waveren <fvw.bugtraq@....cx>
To: Florian Weimer <fw@...eb.enyo.de>
Cc: security-announce@...ts.enyo.de,
	full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: A short warning on the X11 Editres protocol

On Tue, May 31, 2005 at 11:37:37PM +0200, Florian Weimer wrote:
> However, xterm is an Xt application and therefore speaks a
> long-forgotten protocol called Editres.  As a result, any Editres
> client (such as "editres") can instruct an xterm window to change its
> allowSendEvents setting.  After that, it's possible to send
> synthesized events to the xterm window and hijack the terminal.
And even if it weren't toggleable with editres, there's still the
XTEST extension which seems to be pretty omnipresent these days.
Basically, you shouldn't be mixing privileges in one X session (even
using the security extension it's generally something you want to
avoid, design-wise).


-- 
Frank v Waveren                                      Fingerprint: BDD7 D61E
fvw@[var.cx|stack.nl] ICQ#10074100                      5D39 CF05 4BFC F57A
Public key: hkp://wwwkeys.pgp.net/468D62C8              FA00 7D51 468D 62C8


Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ