[23483] in bugtraq
Re: [xforce@iss.net: ISSalert: ISS Advisory: Buffer Overflow in /bin/login]
daemon@ATHENA.MIT.EDU (Wietse Venema)
Thu Dec 13 02:03:05 2001
In-Reply-To: <20011212142920.Z1877@seki.acs.uci.edu> "from Dan Stromberg at Dec
12, 2001 02:29:20 pm"
To: bugtraq@securityfocus.com
Date: Wed, 12 Dec 2001 19:07:07 -0500 (EST)
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=US-ASCII
Message-Id: <20011213000707.26C26BC06F@spike.porcupine.org>
From: wietse@porcupine.org (Wietse Venema)
Dan Stromberg:
> The CERT advisory says this is multiplatform.
>
> Could someone give me the exploit please? I'd like to test a woraround.
Traditionally SYSV login accepts "username name=value name=value..."
both from the command line and from stdin. It isn't hard to find out
if you can/cannot clobber process memory by specifying a sufficient
number of name=value values.
Wietse