[24206] in bugtraq
Re: [Global InterSec 2002012101] DeleGate Application Proxy - Multiple Vulnerabilities
daemon@ATHENA.MIT.EDU (KOJIMA Hajime)
Fri Feb 8 18:05:02 2002
From: kjm@rins.ryukoku.ac.jp (KOJIMA Hajime)
To: bugtraq@securityfocus.com, research@globalintersec.com
In-reply-to: Your message of "Thu, 07 Feb 2002 21:59:10 PST"
In-reply-to: <017801c1b065$ba68f270$0b01a8c0@tomh61ib59mm58>
Date: Fri, 08 Feb 2002 17:16:51 +0900
Message-ID: <52768.1013156211@ideon.st.ryukoku.ac.jp>
In <017801c1b065$ba68f270$0b01a8c0@tomh61ib59mm58>,
"Global InterSec Research" wrote:
|
| As with many of the vulnerabilities in DeleGate, a SIGSEGV occurs
| when attempting to strcpy() unexpectedly long strings.
| In spite of attempts DeleGate makes to randomise the stack, we
| were successful in overwriting the Extended instruction pointer.
| Although the stack randomisation functions make things harder, they
| do not make arbitrary command execution impossible.
And, delegate has execve(2) trap (-Tx). Can you break it?
- kjm