Bugtraq mailing list archives
RE: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv
From: David Endler <dendler () idefense com>
Date: Thu, 26 Sep 2002 11:22:09 -0600 (MDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Boris,
Does not work for me: boris@reston-0491:~/convert$ gv -v gv 3.5.8 (debian) boris@reston-0491:~/convert$ gv gv-exploit.pdf Segmentation fault boris@reston-0491:~/convert$ ls -al /tmp/itworked ls: /tmp/itworked: No such file or directory
I'll quote from the advisory: "A proof of concept exploit for Red Hat Linux designed by zen-parse is..." ^^^^^^^^^^^^^ Other OS specific exploits (i.e. Debian, etc.) with the proper alignments and offsets I imagine would be trivial to create. - -dave David Endler, CISSP Director, Technical Intelligence iDEFENSE, Inc. 14151 Newbrook Drive Suite 100 Chantilly, VA 20151 voice: 703-344-2632 fax: 703-961-1071 dendler () idefense com www.idefense.com -----BEGIN PGP SIGNATURE----- Version: PGP 7.1.2 Comment: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x4B0ACC2A iQA/AwUBPZNNy0rdNYRLCswqEQKl2QCffXscc4fz8HreXgVRMnXtPa3r9u4An2xY Tkg2H+btMUk0zd4/Vy/u9iru =b6Oz -----END PGP SIGNATURE-----
Current thread:
- iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv David Endler (Sep 26)
- Re: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv Boris Veytsman (Sep 26)
- <Possible follow-ups>
- RE: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv David Endler (Sep 26)