[12184] in bugtraq

home help back first fref pref prev next nref lref last post

Re: RFP9903: AeDebug vulnerability

daemon@ATHENA.MIT.EDU (Enno Rey)
Fri Oct 8 19:29:17 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: 7bit
Message-Id:  <002501bf110f$87b91aa0$0160a8c0@server>
Date:         Fri, 8 Oct 1999 00:00:44 +0200
Reply-To: Enno Rey <erey@IX.URZ.UNI-HEIDELBERG.DE>
From: Enno Rey <erey@IX.URZ.UNI-HEIDELBERG.DE>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

----- Original Message -----
From: David LeBlanc <dleblanc@MINDSPRING.COM>
To: <BUGTRAQ@SECURITYFOCUS.COM>
Sent: Tuesday, October 05, 1999 8:24 PM
Subject: Re: RFP9903: AeDebug vulnerability

>David LeBlanc wrote:

>One other thing to consider is that when user processes crash, they can
>sometimes create a user.dmp file, which like UNIX-style core files can
>sometimes contain information useful to an attacker.  There is a way to
>turn this off, but I don't recall what it is at the moment.
>

Just run drwtsn32.exe from system32, then you can configure the behaviour of
drwtsn. There is a little hlp-file explaining the contents of the dump file,
too. (Though this file doesn't treat the subject very deeply, from a
technical point of view)
From time to time, I have to examine the contents of this file; I'm not sure
whether these contents could be useful for an attacker.

Regards,

Enno

erey@ix.urz.uni-heidelberg.de

home help back first fref pref prev next nref lref last post