Feature #83
open
Client hijacking in activation
Added by Tobias Wich over 12 years ago.
Updated about 5 years ago.
Description
Prevent the localhost connection from being triggered by a foreign user/ session. Perhaps an X session.
Need to evaluate attack vector first
- Target version deleted (
4)
- Priority changed from Normal to High
- Target version set to 1.3.0
A "desktop firewall" asking the user whether to accept connections from a certain agent has been proposed.
As of now, it's unclear how to detect the agent and whether the grant should be permanent or per session/ limited amount of time.
- Tracker changed from Bug to Feature
- Priority changed from High to Low
- Target version changed from 1.3.0 to 1.x
Also available in: Atom
PDF