Hello,

On Fri, Mar 29, 2013 at 11:54:21PM +0100, Wolfgang
Zarre wrote:
> I think that in any case the right solution is
> in just flushing the input queue before
> returning to the caller which would not just
> protect in case of hijacking but also of buggy
> applications.

I've successfuly tested an implementation which
keeps the exploit running in the background
_after_ returning control back to rot user. The
running exploit then periodicaly inserts commands
into root terminal, like whoami, rm -rf / etc :)

So flushing the input queue isn't a complete
solution.

-- 
With best regards,
xrgtn

Attachment: signature.asc
Description: Digital signature

Reply via email to