Hi! On Tue, Apr 04, 2006 at 09:15:58PM +0200, RedShift wrote: >[...]
>I cannot see how this would be exploitable. root doesn't have . in it's >PATH. Other people were discussing cat and cta for example. For this to >work, one would have to be able to write to the victim's home directory, >and - of course - the victim would have to make that typo. And it only >works when targeting a user, not the computer itself. 1. IIRC sudo keeps $PATH 2. Both as root and as me, I sometimes cd to /tmp or /var/tmp >I would consider it something handy, in case you don't have write access >outside your home directory, so you can use your own executables, that >can be executed without adding the full path. For that, I routinely add $HOME/bin to the path and put my own stuff (mostly shell scripts though) there. >In my opinion this bug|feature|exploit doesn't pose any threat to system >security. And in my opinion, it does. What about "secure by default"? If you want it less secure/paranoid, you can still change it yourself. Kind regards, Hannah.

