Re: Some revelations about ssh and stackpatch

From: Pavel Kankovsky (peakat_private)
Date: Tue Nov 03 1998 - 13:13:15 PST

  • Next message: Aleph One: "Re: SSHD Exploit"

    On Mon, 2 Nov 1998, M.C.Mar wrote:
    
    > execl("/path_to_sshd/sshd","AAAAAA....[about 2000]",0);
    > 'Cos I have stackpatch applied I saw something very strange in my
    > logs:
    > Nov  2 16:29:52 emsi <BUFFER OVERRUN ATTEMPT>[21738]: log: Server listening on port 22.
    > Nov  2 16:29:52 emsi <BUFFER OVERRUN ATTEMPT>[21738]: log: Generating 768 bit RSA key.
    > Nov  2 16:29:53 emsi <BUFFER OVERRUN ATTEMPT>[21738]: log: RSA key generation complete.
    
    "<BUFFER OVERRUN ATTEMPT>" means that syslog() in (Linux) libc does not
    like your argv[0], this is not a feature or bug or anything of sshd
    
    --Pavel Kankovsky aka Peak  [ Boycott Microsoft--http://www.vcnet.com/bms ]
    "You can't be truly paranoid unless you're sure they have already got you."
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:21:56 PDT