Quantcast
Channel: All Open Tickets - Tera Term on OSDN
Viewing all articles
Browse latest Browse all 2128

Password Exposed - Tera Term Ticket #38928 on OSDN

$
0
0

Password Exposed

Eröffnet am: 2019-02-05 00:12

Letztes Update: 2019-02-05 12:17

Auswertung:(Anonym)Verantwortlicher:(Keine)
Priorität:9 - HöchsteMeilenstein:(Keine)
Typ:FehlerSchweregrad:9 - Höchste
Komponente:Tera Term MacroStatus:Offen
LösungKeine

Einzelheiten

Hello,

Once you have a TTL file set up and run it , it open teraterm , and places the connection details in command manager including the users password , need that to be suppressed

Letzte Aktualisierung für dieses Ticket

2019-02-05 12:17 Aktualisiert von: maya

Kommentar

That means ttermpro.exe must overwrite ARGV to hide the command line parameters? Do you tell the same suggestion to all applications in the world that accepts a password by command line parameter?

If someone can read command line parameters from running process, he already has some privirage in that PC. Doesn't he can read the password from ttl file?


Viewing all articles
Browse latest Browse all 2128