[6721] in bugtraq
Overflows in minicom
daemon@ATHENA.MIT.EDU (Tiago F P Rodrigues)
Sun May 10 15:28:00 1998
Date: Sat, 9 May 1998 21:48:55 +0200
Reply-To: Tiago F P Rodrigues <11108496@LIS.ULUSIADA.PT>
From: Tiago F P Rodrigues <11108496@LIS.ULUSIADA.PT>
To: BUGTRAQ@NETSPACE.ORG
I apologise if this is old, though i haven=B4t found any message on th=
is
issue on bugtraq in the last few months.
It seems minicom(distributed with slak3.4) have some overflow
vulnerabilities, namely in the '-p' switch and when you pick a config
file on the arguments. (a strcpy and a sprintf)
you may test it with:
$ minicom -p/dev/ttyp`perl -e =B4print "A" x 2500=B4`
(Some garbage)
Segmentation fault
An examination under gdb shows saved EIP=3D0x414141
If this is new, I may post an exploit if prompted to.
-----------------------------------------------------------------------=
------
"There are awfull penalties for crimes against the gods"
- Irish Murdoch
Tiago F. P. Rodrigues (BlindPoet)
Universidade Lusiada =B498 - PORTUGAL
-----------------------------------------------------------------------=
------