[14702] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris 7 x86 lpset exploit.

daemon@ATHENA.MIT.EDU (Eugene Ilchenko)
Thu Apr 27 12:28:34 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=koi8-r
Content-Transfer-Encoding: 7bit
Message-Id:  <39079921.928196E4@tsu.ru>
Date:         Thu, 27 Apr 2000 08:34:26 +0700
Reply-To: Eugene Ilchenko <eugene@TSU.RU>
From: Eugene Ilchenko <eugene@TSU.RU>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

Hello!

Andrew Brown wrote:

> >>There is a sparc version avail for this bug, the bug was discovered by
> >>duke some time ago.
> just for people who don't know...or have forgotten...putting this:
>    set noexec_user_stack = 1
>    set noexec_user_stack_log = 1

Just look at http://secinf.net/info/unix/stack.txt for an explanation how to
remake the exploit code, to avoid these settings. This text where sent to
the Bagtraq sometime ago.


> in your /etc/system file protects you against this.  it doesn't fix
> the bug, but it stops the effects from being quite so "bad".

Yes, this method is very good, alas it could not be a panacea :(((

--
------------------------------------------------------
Eugene S. Ilchenko, System Network Administrator
http://secinf.net/

home help back first fref pref prev next nref lref last post