Displaying 2 results from an estimated 2 matches for "boudjnah".
2003 Sep 18
1
2.2.8a newbie path problem
..."
Presently I'm logged in as root and the shell is bash. So I'm to edit the
/etc/profile file correct? My /etc/profile file looks like this
-------------------------------------------------------------------------
# /etc/profile -*- Mode: shell-script -*-
# (c) MandrakeSoft, Chmouel Boudjnah <chmouel@mandrakesoft.com>
loginsh=1
# Users generally won't see annoyng core files
[ "$UID" = "0" ] && ulimit -S -c 1000000 > /dev/null 2>&1
if ! echo ${PATH} |grep -q /usr/X11R6/bin ; then
PATH="$PATH:/usr/X11R6/bin"
fi
if [ "...
1999 Sep 28
0
Re: Linux GNOME exploit
Brock Tellier <btellier@WEBLEY.COM> writes:
> Virtually any program using the GNOME libraries is vulnerable to a
> buffer overflow attack. The attack comes in the form:
>
> /path/to/gnome/prog --enable-sound --espeaker=$80bytebuffer
> The following exploit should work against any GNOME program, though I
> tried it on (the irony) /usr/games/nethack, which is SGID root