[23483] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [xforce@iss.net: ISSalert: ISS Advisory: Buffer Overflow in /bin/login]

daemon@ATHENA.MIT.EDU (Wietse Venema)
Thu Dec 13 02:03:05 2001

In-Reply-To: <20011212142920.Z1877@seki.acs.uci.edu> "from Dan Stromberg at Dec
 12, 2001 02:29:20 pm"
To: bugtraq@securityfocus.com
Date: Wed, 12 Dec 2001 19:07:07 -0500 (EST)
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=US-ASCII
Message-Id: <20011213000707.26C26BC06F@spike.porcupine.org>
From: wietse@porcupine.org (Wietse Venema)

Dan Stromberg:
> The CERT advisory says this is multiplatform.
> 
> Could someone give me the exploit please?  I'd like to test a woraround.

Traditionally SYSV login accepts "username name=value name=value..."
both from the command line and from stdin. It isn't hard to find out
if you can/cannot clobber process memory by specifying a sufficient
number of name=value values.

	Wietse

home help back first fref pref prev next nref lref last post