[14196] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [ Hackerslab bug_paper ] Linux dump buffer overflow

daemon@ATHENA.MIT.EDU (Przemyslaw Frasunek)
Tue Mar 7 10:11:02 2000

Content-Type: text/plain; charset=iso-8859-2
Content-Transfer-Encoding: 8bit
Mime-Version: 1.0
Message-Id:  <XFMail.20000304000835.venglin@freebsd.lublin.pl>
Date:         Sat, 4 Mar 2000 00:08:35 +0100
Reply-To: Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL>
From: Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.10.10003021534400.5417-100000@pager.ce.net>

On 02-Mar-2000 Derek Callaway wrote:
> I believe this overflow is rather difficult to exploit, (although, not
> impossible) as a result of a setuid(getuid()) before the offending code

it does setuid(), but NOT setgid(). still vulnerable.

the major problem is how to pass valid **envp to stack and let getenv()
succesfully return. probably possible by giving pointer to some valid
environment in shared libs.

--
* Fido: 2:480/124 ** WWW: http://www.freebsd.lublin.pl ** NIC-HDL: PMF9-RIPE *
* Inet: venglin@freebsd.lublin.pl ** PGP: D48684904685DF43  EA93AFA13BE170BF *

home help back first fref pref prev next nref lref last post