[18938] in bugtraq
Re: That BIND8 "exploit" attacks NAI
daemon@ATHENA.MIT.EDU (Elias Levy)
Thu Feb 1 17:36:32 2001
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID: <20010201122202.A4307@securityfocus.com>
Date: Thu, 1 Feb 2001 12:22:02 -0700
Reply-To: aleph1@SECURITYFOCUS.COM
From: Elias Levy <aleph1@SECURITYFOCUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
Yup. Its kinda cute. It overflows its own buffer in the set_ptr
function and changes the return address to point into the shellcode.
As always the philosophy of BUGTRAQ is 'caveat emptor'. BUGTRAQ's
moderation is meant to keep discussion. It's not meant to verify
the legitimacy of the information or programs distributed via the
list. That is what the community is for.
--
Elias Levy
SecurityFocus.com
http://www.securityfocus.com/
Si vis pacem, para bellum