[14696] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris 7 x86 lpset exploit.

daemon@ATHENA.MIT.EDU (Andrew Brown)
Wed Apr 26 22:42:02 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000426155119.A8085@noc.untraceable.net>
Date:         Wed, 26 Apr 2000 15:51:19 -0400
Reply-To: Andrew Brown <atatat@atatdot.net>
From: Andrew Brown <atatat@ATATDOT.NET>
X-To:         Laurent LEVIER <llevier@ARGOSNET.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <4.3.1.2.20000425000630.00abc9d0@194.98.103.230>; from
              llevier@ARGOSNET.COM on Tue, Apr 25, 2000 at 12:07:18AM +0200

>>There is a sparc version avail for this bug, the bug was discovered by
>>duke some time ago.

just for people who don't know...or have forgotten...putting this:

   set noexec_user_stack = 1
   set noexec_user_stack_log = 1

in your /etc/system file protects you against this.  it doesn't fix
the bug, but it stops the effects from being quite so "bad".

--
|-----< "CODE WARRIOR" >-----|
codewarrior@daemon.org             * "ah!  i see you have the internet
twofsonet@graffiti.com (Andrew Brown)                that goes *ping*!"
andrew@crossbar.com       * "information is power -- share the wealth."

home help back first fref pref prev next nref lref last post