[14702] in bugtraq
Re: Solaris 7 x86 lpset exploit.
daemon@ATHENA.MIT.EDU (Eugene Ilchenko)
Thu Apr 27 12:28:34 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=koi8-r
Content-Transfer-Encoding: 7bit
Message-Id: <39079921.928196E4@tsu.ru>
Date: Thu, 27 Apr 2000 08:34:26 +0700
Reply-To: Eugene Ilchenko <eugene@TSU.RU>
From: Eugene Ilchenko <eugene@TSU.RU>
X-To: BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
Hello!
Andrew Brown wrote:
> >>There is a sparc version avail for this bug, the bug was discovered by
> >>duke some time ago.
> just for people who don't know...or have forgotten...putting this:
> set noexec_user_stack = 1
> set noexec_user_stack_log = 1
Just look at http://secinf.net/info/unix/stack.txt for an explanation how to
remake the exploit code, to avoid these settings. This text where sent to
the Bagtraq sometime ago.
> in your /etc/system file protects you against this. it doesn't fix
> the bug, but it stops the effects from being quite so "bad".
Yes, this method is very good, alas it could not be a panacea :(((
--
------------------------------------------------------
Eugene S. Ilchenko, System Network Administrator
http://secinf.net/