Hi!

On Tue, Apr 04, 2006 at 09:15:58PM +0200, RedShift wrote:
>[...]

>I cannot see how this would be exploitable. root doesn't have . in it's 
>PATH. Other people were discussing cat and cta for example. For this to 
>work, one would have to be able to write to the victim's home directory, 
>and - of course - the victim would have to make that typo. And it only 
>works when targeting a user, not the computer itself.

1. IIRC sudo keeps $PATH
2. Both as root and as me, I sometimes cd to /tmp or /var/tmp

>I would consider it something handy, in case you don't have write access 
>outside your home directory, so you can use your own executables, that 
>can be executed without adding the full path.

For that, I routinely add $HOME/bin to the path and put my own stuff
(mostly shell scripts though) there.

>In my opinion this bug|feature|exploit doesn't pose any threat to system 
>security.

And in my opinion, it does. What about "secure by default"? If you
want it less secure/paranoid, you can still change it yourself.

Kind regards,

Hannah.

Reply via email to