[18938] in bugtraq

home help back first fref pref prev next nref lref last post

Re: That BIND8 "exploit" attacks NAI

daemon@ATHENA.MIT.EDU (Elias Levy)
Thu Feb 1 17:36:32 2001

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID:  <20010201122202.A4307@securityfocus.com>
Date:         Thu, 1 Feb 2001 12:22:02 -0700
Reply-To: aleph1@SECURITYFOCUS.COM
From: Elias Levy <aleph1@SECURITYFOCUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

Yup. Its kinda cute. It overflows its own buffer in the set_ptr
function and changes the return address to point into the shellcode.

As always the philosophy of BUGTRAQ is 'caveat emptor'. BUGTRAQ's
moderation is meant to keep discussion. It's not meant to verify
the legitimacy of the information or programs distributed via the
list. That is what the community is for.

--
Elias Levy
SecurityFocus.com
http://www.securityfocus.com/
Si vis pacem, para bellum

home help back first fref pref prev next nref lref last post