[7439] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Fwd: Any user can panic OpenBSD machine

daemon@ATHENA.MIT.EDU (Cy Schubert)
Tue Jul 28 21:56:19 1998

Date: 	Tue, 28 Jul 1998 13:41:59 -0700
Reply-To: Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca>
From: Cy Schubert <cschuber@PASSER.OSG.GOV.BC.CA>
X-To:         Kragen <kragen@POBOX.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Your message of "Tue, 28 Jul 1998 12:32:17 EDT." 
              <Pine.GSU.4.02.9807281226520.15906-100000@picard.dnaco.net>

> On Mon, 27 Jul 1998, Theo de Raadt wrote:
> > Whoopty doo -- another way to crash another operating system has been
> > reported.  This is twice now that a 'local' OpenBSD crash has made it
> > to bugtraq as if it were a typical exploit.  Does this now mean
> > bugtraq is open ground for reporting any way to crash a multiuser
> > operating system?  I bet there are plenty of ways to crash any
> > operating system, if you have a local account.
>
> There are operating systems -- KeyKOS and MVS, for example -- in which
> making this impossible is an explicit design goal.  I do not believe
> there are any known local-DoS exploits for either of these two OSes.

There have been no published MVS exploits, however I have seen two
exploits over the years and one TSO UADS exploit (pre-RACF/ACF2/Top
Secret).  Regarding exploits of locally written APF authorized
programs, I've only seen one.

What makes MVS (and VM) so impervious to attack is that the S/390
hardware doesn't rely on a stack, making effective buffer overruns
considerably more difficult.  (A little off topic :)


Regards,                       Phone:  (250)387-8437
Cy Schubert                      Fax:  (250)387-5766
Open Systems Group          Internet:  cschuber@uumail.gov.bc.ca
ITSD                                   Cy.Schubert@gems8.gov.bc.ca
Government of BC

home help back first fref pref prev next nref lref last post