[39633] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: netscape bug

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Wed Sep 20 16:43:37 1995

To: "Vladimir Z. Nuri" <vznuri@netcom.com>
Cc: cypherpunks@toad.com
In-Reply-To: Your message of "Wed, 20 Sep 1995 11:55:31 PDT."
             <199509201855.LAA17261@netcom16.netcom.com> 
Reply-To: perry@piermont.com
Date: Wed, 20 Sep 1995 16:02:21 -0400
From: "Perry E. Metzger" <perry@piermont.com>


"Vladimir Z. Nuri" writes:
> none of the articles mention that the cracker must have login access
> to the computer that the random numbers are generated on. is this true?
> does the code require knowledge of the PID etc. that can only be obtained
> by a login to the system that the netscape session is running on?

You can guess the PID without much trouble -- they are 15 bit numbers.

> P.M. notes that anywhere there is a data-driven buffer overflow (which
> he suspects are all over netscape) he can get code to execute anything
> he wants. this reminds me of the
> Morris internet worm that ran exactly the same way.

That was one of the first wide exploits of the trick, yes.

> my question: I have not seen the specifics of how this works. does
> this require specialized knowledge of the native machine language on the 
> host machine?

Yes. However, its very straightforward to do.

The recent syslog(3) problem was of this nature, by the way.

Perry

home help back first fref pref prev next nref lref last post