Vulnerability Development mailing list archives
Remote exploitation of network scanners?
From: Lincoln Yeoh <lyeoh () POP JARING MY>
Date: Fri, 25 Aug 2000 15:56:30 +0800
Hi people! I wonder if the many popular scanners out there are written securely - so that they themselves cannot be exploited. It seems to me that many of these programs are written as a "proof of concept" or as instructive samples, and good for that purpose alone but may not be robust enough for use in a hostile environment. Hypothetical scenario: A scanner requiring remote input scans a targeted host, looking for replies. The targeted host replies with exceptional input causing the scanner to run arbitrary code (buffer overflow etc etc), probably with the privileges of the user running that scanner. Denial of service programs are probably less vulnerable since they usually don't require remote input (except maybe dns?). They usually accept input from the command-line which shouldn't become a problem in typical usage :). Note that I am not saying that the authors of such programs are writing poor quality code, far from it, but there is a danger that some users may be using them under inappropriate conditions for purposes they were not designed for. After all much of the code released is "for educational purposes only" ;). Have a nice weekend! Link.
Current thread:
- Packet Fragmentation Attacks Max (Aug 24)
- Re: Packet Fragmentation Attacks Mikael Olsson (Aug 25)
- Remote exploitation of network scanners? Lincoln Yeoh (Aug 25)
- Re: Remote exploitation of network scanners? Paul Cardon (Aug 25)
- Re: Remote exploitation of network scanners? Marc Maiffret (Aug 25)
- Re: Remote exploitation of network scanners? Ricardo Anguiano (Aug 25)
- Re: Remote exploitation of network scanners? Bluefish (P.Magnusson) (Aug 26)
- Re: Remote exploitation of network scanners? Lincoln Yeoh (Aug 26)
- Re: Remote exploitation of network scanners? Ricardo Anguiano (Aug 26)
- Re: Remote exploitation of network scanners? Ryan Sweat (Aug 26)
- Re: Remote exploitation of network scanners? Adam Prato (Aug 25)
- Re: Remote exploitation of network scanners? Fyodor (Aug 26)
- Re: Remote exploitation of network scanners? Marshall Beddoe (Aug 26)