|
|
ncryptor wrote:
>
> [...]
>
> The render farm of some projects, such as IMP, are based on scripts
> checking the server for new files, downloading them and running pov with
> them. An exploiter could fool the script into running pov with a
> command line which will allow access to the user's computer. for example,
> the script might think that 'ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ...' is
> the file name and try running pov with this command line.
> This isn't concrete but a security leak is possible.
I have the impression you are just trying to seed some paranoia, unless
you have a concrete example of something going wrong i don't see any
problems.
Christoph
--
POV-Ray tutorials, IsoWood include,
TransSkin and more: http://www.tu-bs.de/~y0013390/
Last updated 20 Apr. 2002 _____./\/^>_*_<^\/\.______
Post a reply to this message
|
|