lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu Jun 2 12:03:11 2005 From: fvw.bugtraq at var.cx (Frank v Waveren) Subject: Re: A short warning on the X11 Editres protocol On Tue, May 31, 2005 at 11:37:37PM +0200, Florian Weimer wrote: > However, xterm is an Xt application and therefore speaks a > long-forgotten protocol called Editres. As a result, any Editres > client (such as "editres") can instruct an xterm window to change its > allowSendEvents setting. After that, it's possible to send > synthesized events to the xterm window and hijack the terminal. And even if it weren't toggleable with editres, there's still the XTEST extension which seems to be pretty omnipresent these days. Basically, you shouldn't be mixing privileges in one X session (even using the security extension it's generally something you want to avoid, design-wise). -- Frank v Waveren Fingerprint: BDD7 D61E fvw@[var.cx|stack.nl] ICQ#10074100 5D39 CF05 4BFC F57A Public key: hkp://wwwkeys.pgp.net/468D62C8 FA00 7D51 468D 62C8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050602/15e02b88/attachment.bin
Powered by blists - more mailing lists