[14127] in bugtraq
Re: [ Hackerslab bug_paper ] Linux dump buffer overflow
daemon@ATHENA.MIT.EDU (Brett Lymn)
Wed Mar  1 21:14:13 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <200003010038.LAA09130@mallee.awadi>
Date:         Wed, 1 Mar 2000 11:08:02 +1030
Reply-To: Brett Lymn <blymn@BAEA.COM.AU>
From: Brett Lymn <blymn@BAEA.COM.AU>
X-To:         s96192@CE.HANNAM.AC.KR
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200002280617.PAA13373@ce.hannam.ac.kr> from "1h?kAX KimYongJun
              (99A9>w)" at Feb 28, 2000 03:17:33 PM
According to "KimYongJun":
>
>File   :   /sbin/dump
>
>SYSTEM :   Linux
>
>
NetBSD-current, at least, is not vulnerable to this.  It just returns
a filename too long error.  I do not have a release version of NetBSD
to try this on at the moment.
--
===============================================================================
Brett Lymn, Computer Systems Administrator, BAE SYSTEMS
===============================================================================