Re: finger
> I may have misspoken on this. I believe that there are exploits involving
> finger and executable code, but I'm not sure of the details since it's been
> a while. I gave the issue some thought last night after I posted this and
There have also been buffer overflows in _every_ version of finger since
time began. They keep saying they're fixed, and then somebody finds
another. Running such things as root is _BAD_. :)
Will
--------------------------------------------------------------------------
| harpo@udel.edu lowe@cis.udel.edu lowe@debian.org lowe@asel.udel.edu |
| http://www.cis.udel.edu/~lowe/ |
| PGP Public Key: http://www.cis.udel.edu/~lowe/index.html#pgpkey |
--------------------------------------------------------------------------
Reply to: