Re: tmp exploit with redhat printfilter?

From: Pavel Kankovsky (peakat_private)
Date: Sun Sep 13 1998 - 23:31:29 PDT

  • Next message: Roy Hills: "Borderware predictable TCP seq. numbers - Summary of responses"

    On Sun, 13 Sep 1998, base16at_private wrote:
    
    > It seems the RedHat print filter contains the following lines:
    >
    >           if [ ${i##*:} = "DONE" ]; then
    >              if [ "$DEBUG_FILTER" != "" ]; then
    >                echo "$root -> depth = $depth" >> /tmp/filter.debug
    >              fi
    
    and these
    
    #
    #   define these to gets lots of feedback
    #   output is appended on /tmp/filter.debug
    #
        DEBUG_TREE=""
        DEBUG_FILTER=""
    
    
    You're safe unless you enable debugging.
    When you do, you should be careful though...
    
    
    
    --Pavel Kankovsky aka Peak  [ Boycott Microsoft--http://www.vcnet.com/bms ]
    "You can't be truly paranoid unless you're sure they have already got you."
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:16:13 PDT