1) We presented this attack and a solution in "Practical Unix Security" back in 1991. See pp. 338-339. 2) We present the same attack with more solutions in "Practical Unix & Internet Security" in 1996. See pp. 769-771. Sometimes, a day hacking at the keyboard obviates the need to spend 15 minutes with a reference book.
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:34:45 PDT