lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a1aaf36e0706041000x177d0de3qb008a72196bc93e8@mail.gmail.com>
Date: Mon, 4 Jun 2007 19:00:38 +0200
From: "Lolek of TK53" <lolek1337@...glemail.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: screen 4.0.3 local Authentication Bypass

Hi,
On 6/4/07, rembrandt@...erlin.de <rembrandt@...erlin.de> wrote:
> Please take a look at the Attachement dear List moderator. :)
...
> It has been tested on OpenBSD 4.1 + screen 4.0.3 on x86.
>
> How to reproduce:
>
> Lock screen using ctrl+x
> Choose a Password
> Confirm the Password
>
> Screen asks for a Password to unlock the screen.
> Just press ctrl+c and it displays "Getpass error".
> 2 seconds later the screen is unlocked and you`ve access.

This is not reproducable with screen 4.0.3 on a Linux system. Also
with looking at the code of screen I can see no vulnerability in this
context. Can you show some code that proves your claim?
If not I suggest to get a better operating system distributor ;)
Cheers
Lolek of TK53
P.S. It's ctrl-a x not ctrl-x

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ