Re: [Full-disclosure] pidgin OTR information leakage

看板Bugtraq作者時間14年前 (2012/02/28 05:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/5 (看更多)
On Feb 27, 2012, at 2:37 PM, Michele Orru wrote: > I think you didn't understood the content of the advisory. > If there are 10 non-root users in an Ubuntu machine for example, > if user 1 is using pidgin with OTR compiled with DBUS, then user 2 to 10 > can see what user 1 pidgin conversation. This is not what the OP or CVE describe: >> plaintext. This makes it possible for attackers that have gained=20 >> user-level access on a host, to listen in on private conversations=20 >> associated with the victim account. Which I read as: if I compromise user1's account then I can snoop user1's D= BUS sessions. It says nothing about me being able to snoop user2's session= s. The leading phrase about attackers gaining user-level access implies th= at legitimate users on a system are not a relevant issue. I believe that clarification is in order. --=20 Rich Pieri <ratinox@MIT.EDU> MIT Laboratory for Nuclear Science
文章代碼(AID): #1FI_PJNr (Bugtraq)
討論串 (同標題文章)
文章代碼(AID): #1FI_PJNr (Bugtraq)