Home page logo

bugtraq logo Bugtraq mailing list archives

Re: Security Advisory: Buffer overflow in RSAREF2
From: core.lists.bugtraq () CORE-SDI COM (Gerardo Richarte)
Date: Thu, 2 Dec 1999 16:50:46 -0300

Gerardo Richarte wrote:

While researching the exploitability of a buffer overflow in
SSH up to version 1.2.27, we discovered a second buffer overflow
in the implmementation of the RSA algorithm in RSAREF2 from
RSA Data Security.

        To make this clear: in combination with the buffer overflow in rsaglue.c this makes possible to get
a remote shell on a machine running sshd AND it also makes possible to use a reverse exploit to gain access on
clients' machines, using malicious sshd.


PS: We are studding the possibility of using this buffer overflow alone, not in combination with rsaglue.c. What will 
make it possible to exploit it on patched ssh and sshd, and probably in OpenSSH

A390 1BBA 2C58 D679 5A71 - 86F9 404F 4B53 3944 C2D0
Investigacion y Desarrollo - CoreLabs - Core SDI

--- For a personal reply use gera () core-sdi com

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]