[33017] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Linux kernel do_mremap() proof-of-concept exploit code

daemon@ATHENA.MIT.EDU (Bruno Lustosa)
Tue Jan 6 12:53:07 2004

Date: Tue, 6 Jan 2004 14:03:35 -0200
From: Bruno Lustosa <bruno@lustosa.net>
To: bugtraq@securityfocus.com
Message-ID: <20040106160335.GA1048@lustosa.net>
Mail-Followup-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="qMm9M+Fa2AknHoGS"
Content-Disposition: inline
In-Reply-To: <20040105212237.GA4721@lmsw.net>

--qMm9M+Fa2AknHoGS
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

* Christophe Devine <devine@iie.cnam.fr> [06-01-2004 13:45]:
> The following program can be used to test if a x86 Linux system
> is vulnerable to the do_mremap() exploit; use at your own risk.

Tested it under Linux 2.6.1-rc1, and surprisingly, the machine rebooted
instantly. Isn't the mremap bug supposed to be fixed on the 2.6 series?

--=20
Bruno Lustosa, aka Lofofora          | Email: bruno@lustosa.net
Network Administrator/Web Programmer | ICQ UIN: 1406477
Rio de Janeiro - Brazil              |

--qMm9M+Fa2AknHoGS
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/+txWiNfNvfQ8L5IRAi8aAJ9UJgH8zMu7zhjl5MeAfY8d40T25wCfTIzM
XshhylL2W1Qw9eEHD4Lg0sA=
=A3BV
-----END PGP SIGNATURE-----

--qMm9M+Fa2AknHoGS--

home help back first fref pref prev next nref lref last post