home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.gopher,alt.security,comp.lang.postscript
- From: riddle@is.rice.edu (Prentiss Riddle)
- Subject: Gopher PostScript data type would constitute a security hole
- Message-ID: <1992May5.161126.11521@rice.edu>
- Organization: Ministry of Information, William's Marsh
- References: <92May4.112004edt.53306@watdragon.waterloo.edu> <1992May5.033112.13853@menudo.uh.edu>
- Date: Tue, 5 May 1992 16:11:26 GMT
-
- In article <1992May5.033112.13853@menudo.uh.edu> davison@menudo.uh.edu (Dan Davison) writes:
- >... How are new types added to the gopher protocol? For
- >instance, we'd like to be able to return a genetic map in (say)
- >postscript format; this would require that the client be able to
- >interpret postscript (OK for NeXT and Suns) or call an interpreter
- >(Mac?) DOS has ghostview...
-
- I've been waiting for this to come up. One of my colleagues here who
- was looking at the use of PostScript with Metamail stumbled across a
- disturbing fact:
-
- > Article: 6158 of alt.security
- > From: pkn@is.rice.edu (Kay Nettle)
- > Subject: a safe Postscript interpreter
- > Message-ID: <1992Apr7.181248.28090@rice.edu>
- > Date: Tue, 7 Apr 1992 18:12:48 GMT
- >
- > I have just become aware that Postscript can have security holes in
- > it, filenameforall, deletefile, renamefile, etc. Does anyone know of
- > a "safe" Postscript interpreter?
- >
- > Kay Nettle internet:pkn@is.rice.edu
-
- To spell this out a bit more clearly: some implementations of
- PostScript include functions which could be used by the malicious to
- create trojan horses. The functions appear to be powerful enough to
- delete files, list directories, mail away data from your system, and
- conceivably even implement PostScript viruses.
-
- GhostScript, the GNU PostScript interpreter on which GhostView is
- based, appears to implement these scary functions, and the author has
- not been responsive to our request that a "safe" mode be added to
- GhostScript. Nor have we found an alternative PostScript previewer
- with a "safe" mode.
-
- I would urge that a solution to this problem be found before a
- PostScript type is added to Gopher. If a full previewer with a "safe"
- mode isn't available for all the architectures served by Gopher,
- perhaps a simple filter which strips suspect commands out of PostScript
- files would do the trick. This has been posted to comp.lang.postscript
- and alt.security before, and I'm slightly astonished at the lack of
- response.
-
- Meanwhile, think twice before previewing any PostScript files from
- sources you don't trust.
-
- -- Prentiss Riddle ("aprendiz de todo, maestro de nada") riddle@rice.edu
- -- Unix Systems Programmer, Office of Networking and Computing Systems
- -- Rice University, POB 1892, Houston, TX 77251 / Mudd 208 / 713-285-5327
- -- Opinions expressed are not necessarily those of my employer.
-
-