[14127] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [ Hackerslab bug_paper ] Linux dump buffer overflow

daemon@ATHENA.MIT.EDU (Brett Lymn)
Wed Mar 1 21:14:13 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <200003010038.LAA09130@mallee.awadi>
Date:         Wed, 1 Mar 2000 11:08:02 +1030
Reply-To: Brett Lymn <blymn@BAEA.COM.AU>
From: Brett Lymn <blymn@BAEA.COM.AU>
X-To:         s96192@CE.HANNAM.AC.KR
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200002280617.PAA13373@ce.hannam.ac.kr> from "1h?kAX KimYongJun
              (99A9>w)" at Feb 28, 2000 03:17:33 PM

According to "KimYongJun":
>
>File   :   /sbin/dump
>
>SYSTEM :   Linux
>
>

NetBSD-current, at least, is not vulnerable to this.  It just returns
a filename too long error.  I do not have a release version of NetBSD
to try this on at the moment.

--
===============================================================================
Brett Lymn, Computer Systems Administrator, BAE SYSTEMS
===============================================================================

home help back first fref pref prev next nref lref last post