[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-Disclosure] Re: Gaim festival plugin exploit
- To: <pheath@trudellmed.com>
- Subject: [Full-Disclosure] Re: Gaim festival plugin exploit
- From: "Randal L. Schwartz" <merlyn@stonehenge.com>
- Date: Mon, 20 Oct 2003 17:00:55 -0400
>>>>> "HCTITS" == HCTITS Security Division <security@humancentrictech.com>
>>>>> writes:
HCTITS> DUH... would help if I attached my attachment.
Is this is repeat? I'm going to repeat myself then.
YOUR FIX DOES NOT HELP. Please use my posted fix.
>> system("echo \"$string\" | /usr/bin/festival --tts");
Replace this with
open FEST, "|/usr/bin/festival --tts";
print FEST $string, "\n";
close FEST;
No shells involved. Only DOS exploits and maybe the usual
C-language overflows in festival itself.
--
Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095
<merlyn@stonehenge.com> <URL:http://www.stonehenge.com/merlyn/>
Perl/Unix/security consulting, Technical writing, Comedy, etc. etc.
See PerlTraining.Stonehenge.com for onsite and open-enrollment Perl training!
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html