FreeBSD System Call Signed Integer Buffer Overflow Vulnerability

From: omegatronat_private
Date: Thu Aug 22 2002 - 18:59:13 PDT

  • Next message: Chris Paget: "More on Shatter"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    Hi,
    
    Has anyone tried exploiting the vulnerable system calls for this hole?
    
    Non-programmer type looking for proof of concept exploit code for this hole. Would like to provide customers with code to test for this hole. Appears this can be exploited to obtain root privs?
    
    Please see for vulnerability info:
    
    http://online.securityfocus.com/bid/5493
    
    Any help/code would be appreciated.
    
    o.
    
    -----BEGIN PGP SIGNATURE-----
    Version: Hush 2.1
    Note: This signature can be verified at https://www.hushtools.com
    
    wl4EARECAB4FAj1llfEXHG9tZWdhdHJvbkBodXNobWFpbC5jb20ACgkQYPShwwsH0MKF
    QQCgmwLRFVBr/GHKT1q60alfARLG/oEAn0aFl35uq4/eTjxv0XyAAOF7RYlB
    =qPjn
    -----END PGP SIGNATURE-----
    
    
    
    
    Get your free encrypted email at https://www.hushmail.com
    



    This archive was generated by hypermail 2b30 : Thu Aug 22 2002 - 21:42:17 PDT