[32702] in bugtraq

home help back first fref pref prev next nref lref last post

[iSEC] Linux kernel do_brk() vulnerability details

daemon@ATHENA.MIT.EDU (Paul Starzetz)
Fri Dec 5 13:30:02 2003

Date: Fri, 5 Dec 2003 00:04:59 +0100 (CET)
From: Paul Starzetz <paul@isec.pl>
Reply-To: security@isec.pl
To: bugtraq@securityfocus.com, <vulnwatch@vulnwatch.org>,
        <full-disclosure@lists.netsys.com>
Message-ID: <Pine.LNX.4.44.0312042358340.26831-100000@isec.pl>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

We have released a paper covering technical details of the do_brk() bug
and the results of our research done while writing the exploit code. 
It also describes the numerous techniques we have used to create a very 
effective exploit code that leads to full privilege escalation even on
systems running a kernel secured with various security patches.

It can be found at: http://isec.pl/papers/linux_kernel_do_brk.pdf

Regards,

- -- 
Paul Starzetz
iSEC Security Research
http://isec.pl/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/z7vdC+8U3Z5wpu4RAkP0AKDH0sNST6CjjTmIfGTSETSAa922hgCfR3mz
tSWdaV41pn1zznrPb/8lQtA=
=VOlJ
-----END PGP SIGNATURE-----





home help back first fref pref prev next nref lref last post