[20812] in bugtraq
Re: insecure signal handler design
daemon@ATHENA.MIT.EDU (Magosányi" "Árpád)
Wed May 30 14:35:32 2001
From: "Magosányi" "Árpád" <mag@bunuel.tii.matav.hu>
Date: Tue, 29 May 2001 21:28:42 +0200
To: Michal Zalewski <lcamtuf@bos.bindview.com>
Cc: bugtraq@securityfocus.com
Message-ID: <20010529212842.A12500@bunuel.tii.matav.hu>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.21.0105281753520.18807-200000@nimue.bos.bindview.com>; from lcamtuf@bos.bindview.com on Mon, May 28, 2001 at 06:10:16PM -0400
Content-Transfer-Encoding: 8bit
A levelezőm azt hiszi, hogy Michal Zalewski a következőeket írta:
>
> We are proud to announce our new security paper, "Delivering signals for
> fun and profit". This paper is an attempt to discuss security aspects of
[]
> For your convenience, it is attached to this message as well (20 kB). Your
> feedback would be greatly appreciated.
Hi!
Is there any known exploit against real programs using this technique?
The technique seems to work in a very low probability level due to
the timing issues. But the first thing I have learned reading bugtraq
is that if something is even remotely and theoretically exploitable,
someone is using the technique for years already (and openbsd have
fixed it two years ago:).