[20439] in bugtraq
Re: x86 vulnerability ?
daemon@ATHENA.MIT.EDU (Andrew R. Reiter)
Wed Apr 25 20:47:30 2001
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID: <Pine.NEB.3.96L.1010424175956.22757A-100000@fledge.watson.org>
Date: Tue, 24 Apr 2001 18:03:27 -0400
Reply-To: "Andrew R. Reiter" <arr@WATSON.ORG>
From: "Andrew R. Reiter" <arr@WATSON.ORG>
X-To: Cyber Hunter <cyber_hunter@LINUXBR.COM.BR>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <002401bfb811$51006b40$019da8c0@mps.com.br>
Actually, Esa Etelavuori wrote a paper on exploiting kernel buffer
overflows in FreeBSD... which is similar, I assume, to what they did. In
this paper he discusses using kernel bugs for exploitation for breaking
out of jail(2). Pretty neat stuff :-)
Im not sure if the paper is being held somewhere offically, but a copy of
it was sent to bugtraq the end of december. You can find it at:
http://security-archive.merton.ox.ac.uk/bugtraq-200012/0501.html
Enjoy.
Andrew
On Sun, 7 May 2000, Cyber Hunter wrote:
> Does anyone know anything about the vulnerability found by the group LSD in
> the x86 systems ? That has helped them to win the Argus Event ?
> http://www.argus-systems.com/events/infosec/#Rules
>
> I would like to study this.
>
*-------------.................................................
| Andrew R. Reiter
| arr@fledge.watson.org
| "It requires a very unusual mind
| to undertake the analysis of the obvious" -- A.N. Whitehead