Re: Solaris ipcs vulnerability

From: Robert Sink (sinkrat_private)
Date: Mon Apr 16 2001 - 13:48:06 PDT

  • Next message: Jurjen Oskam: "Re: Double clicking on innocent looking files may be dangerous"

    I've tried:
    
    TZ=`/usr/local/bin/perl -e 'print "A"x1107'`
    
    ...on... both 64 bit Solaris 8 and Solaris 7 (we have no 32 bit
    machines here) and cannot get the programs to crash.  They just
    happily display the A's, plus the other information and exit normally.
    
    Solaris 7: SunOS xxx 5.7 Generic_106541-12 sun4u sparc
    Solaris 8: SunOS xxx 5.8 Generic_108528-05 sun4u sparc
    
    I keep the patches on the bleeding edge, but I can find nothing
    offhand in the latest patchdiag.xref that would have altered this.
    
    Am I missing something?
    
    --
    Robert Sink - Asst. Dept. Head - Computer/Network Services
    Univ. of Maryland Chesapeake Biological Laboratory - Solomons, MD.
    [o] 410/326-7306
    
    On Apr 16, Neil W Rickert (rickert+btat_private) wrote:
    >
    > This might be a matter of looking in the wrong place.
    >
    > For programs where there are both 32bit and 64bit versions, the
    > program you see might be a stub that invokes the real program.
    > For example, on 32-bit solaris 8, what is actually run is
    >
    > -r-xr-sr-x   1 root     sys        10740 Jan  5  2000 /usr/bin/sparcv7/ipcs
    >
    > That is sgid.
    >
    >  -NWR
    



    This archive was generated by hypermail 2b30 : Tue Apr 17 2001 - 00:15:54 PDT