[8393] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Some revelations about ssh and stackpatch

daemon@ATHENA.MIT.EDU (Pavel Kankovsky)
Wed Nov 4 12:51:22 1998

Date: 	Tue, 3 Nov 1998 22:13:15 +0100
Reply-To: peak@kerberos.troja.mff.cuni.cz
From: Pavel Kankovsky <peak@KERBEROS.TROJA.MFF.CUNI.CZ>
X-To:         "M.C.Mar" <emsi@blah.pl>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.GSO.3.96.981102162614.22118g-100000@dollar.it.com.pl>

On Mon, 2 Nov 1998, M.C.Mar wrote:

> execl("/path_to_sshd/sshd","AAAAAA....[about 2000]",0);
> 'Cos I have stackpatch applied I saw something very strange in my
> logs:
> Nov  2 16:29:52 emsi <BUFFER OVERRUN ATTEMPT>[21738]: log: Server listening on port 22.
> Nov  2 16:29:52 emsi <BUFFER OVERRUN ATTEMPT>[21738]: log: Generating 768 bit RSA key.
> Nov  2 16:29:53 emsi <BUFFER OVERRUN ATTEMPT>[21738]: log: RSA key generation complete.

"<BUFFER OVERRUN ATTEMPT>" means that syslog() in (Linux) libc does not
like your argv[0], this is not a feature or bug or anything of sshd

--Pavel Kankovsky aka Peak  [ Boycott Microsoft--http://www.vcnet.com/bms ]
"You can't be truly paranoid unless you're sure they have already got you."

home help back first fref pref prev next nref lref last post