Bugtraq mailing list archives
Re: [ ** Snes9x buffer overflow vulnerability ** ]
From: Mike Hoskins <mike () adept org>
Date: Tue, 16 Oct 2001 12:05:13 -0700 (PDT)
On Tue, 16 Oct 2001, Niels Heinen wrote:
Tested platforms: FreeBSD, NetBSD, OpenBSD and Linux.
Version(s)? mike@mojo{mike}$ uname -a FreeBSD mojo.televoke.net 4.4-STABLE FreeBSD 4.4-STABLE #5: Tue Sep 18 16:11:35 PDT 2001 mike () mojo televoke net:/usr/obj/usr/src/sys/MOJO i386 mike@mojo{mike}$ ls -al /usr/X11R6/bin/snes9x -r-xr-xr-x 1 root wheel 1718336 Jun 25 11:08 /usr/X11R6/bin/snes9x* mike@mojo{mike}$ pkg_info|grep snes snes9x-1.37c Super Nintendo Entertainment System(SNES) Emulator This was installed from ports and did not have SUID set by default. Still, it is a find. Good work, but does anyone set SUID beside those reading the README and following the developer's suggestions (curious)? Later, -Mike -- "Information may want to be free, but fiber optic cable wants to be a million US dollars per mile." --Shawn McMahon
Current thread:
- [ ** Snes9x buffer overflow vulnerability ** ] Niels Heinen (Oct 16)
- Re: [ ** Snes9x buffer overflow vulnerability ** ] Roman Drahtmueller (Oct 16)
- Re: [ ** Snes9x buffer overflow vulnerability ** ] Scott Dier (Oct 16)
- Re: [ ** Snes9x buffer overflow vulnerability ** ] Alistair Crooks (Oct 16)
- Re: [ ** Snes9x buffer overflow vulnerability ** ] Christian Surchi (Oct 16)
- Re: [ ** Snes9x buffer overflow vulnerability ** ] Mike Hoskins (Oct 16)
- Re: [ ** Snes9x buffer overflow vulnerability ** ] Heikki Korpela (Oct 16)