[comp.windows.x] Security Hole in setuid xterm

fwp1@CC.MsState.Edu (Frank Peters) (02/06/91)

Hello,

Could someone send me the exact nature of the known security problems
with a setuid xterm under SunOS (4.1 in our case)?  Specifically I'd
like to know if a statically linked xterm eliminates this problem (I
believe it is related to fooling shared libraries)?

We have problems with unwanted talk requests on our central server,
but users can't use mesg from an xterm (because device ownership isn't
changed from root to the user).

FWP
--
Frank Peters   Internet:  fwp1@CC.MsState.Edu         Bitnet:  FWP1@MsState
               Phone:     (601)325-2942               FAX:     (601)325-8921

gildea@expo.lcs.mit.EDU (Stephen Gildea) (02/07/91)

You are correct, the problem can only occur with a
dynamically linked xterm.

 < Stephen
   MIT X Consortium