[20439] in bugtraq

home help back first fref pref prev next nref lref last post

Re: x86 vulnerability ?

daemon@ATHENA.MIT.EDU (Andrew R. Reiter)
Wed Apr 25 20:47:30 2001

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.NEB.3.96L.1010424175956.22757A-100000@fledge.watson.org>
Date:         Tue, 24 Apr 2001 18:03:27 -0400
Reply-To: "Andrew R. Reiter" <arr@WATSON.ORG>
From: "Andrew R. Reiter" <arr@WATSON.ORG>
X-To:         Cyber Hunter <cyber_hunter@LINUXBR.COM.BR>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <002401bfb811$51006b40$019da8c0@mps.com.br>

Actually, Esa Etelavuori wrote a paper on exploiting kernel buffer
overflows in FreeBSD... which is similar, I assume, to what they did.  In
this paper he discusses using kernel bugs for exploitation for breaking
out of jail(2).  Pretty neat stuff :-)

Im not sure if the paper is being held somewhere offically, but a copy of
it was sent to bugtraq the end of december.  You can find it at:

http://security-archive.merton.ox.ac.uk/bugtraq-200012/0501.html

Enjoy.

Andrew

On Sun, 7 May 2000, Cyber Hunter wrote:

> Does anyone know anything about the vulnerability found by the group LSD in
> the x86 systems ? That has helped them to win the Argus Event ?
> http://www.argus-systems.com/events/infosec/#Rules
>
> I would like to study this.
>

*-------------.................................................
| Andrew R. Reiter
| arr@fledge.watson.org
| "It requires a very unusual mind
|   to undertake the analysis of the obvious" -- A.N. Whitehead

home help back first fref pref prev next nref lref last post