Home page logo

bugtraq logo Bugtraq mailing list archives

Re: [ Hackerslab bug_paper ] Linux dump buffer overflow
From: venglin () FREEBSD LUBLIN PL (Przemyslaw Frasunek)
Date: Sat, 4 Mar 2000 00:08:35 +0100

On 02-Mar-2000 Derek Callaway wrote:
I believe this overflow is rather difficult to exploit, (although, not
impossible) as a result of a setuid(getuid()) before the offending code

it does setuid(), but NOT setgid(). still vulnerable.

the major problem is how to pass valid **envp to stack and let getenv()
succesfully return. probably possible by giving pointer to some valid
environment in shared libs.

* Fido: 2:480/124 ** WWW: http://www.freebsd.lublin.pl ** NIC-HDL: PMF9-RIPE *
* Inet: venglin () freebsd lublin pl ** PGP: D48684904685DF43  EA93AFA13BE170BF *

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]