Vulnerability Development mailing list archives
Re: man -K overflow
From: Knud Erik Højgaard - CyberCity Support <kain () EGOTRIP DK>
Date: Thu, 15 Feb 2001 11:13:41 +0100
Red Hat Linux release 6.1.92 (Piglet) Kernel 2.2.15-2.5.0 on an i586 [kain@beast kain]$ man -K `perl -e '{print "A"x"8285"}'` Segmentation fault [kain@beast kain]$ Med venlig hilsen Knud Erik Højgaard <knud () cybercity dk> Cybercity Erhvervssupport <support () erhverv cybercity dk> http://www.cybercity.dk/support Tlf 33 98 30 60 -----Original Message----- From: VULN-DEV List [mailto:VULN-DEV () SECURITYFOCUS COM]On Behalf Of enthh () FLASH NET Sent: 15. februar 2001 03:40 To: VULN-DEV () SECURITYFOCUS COM Subject: man -K overflow man crashes when too many characters (around 8300) are passed thru the -K option (tested in Slackware 7.0.0). $ man -K `perl -e '{print "A"x"8285"}'` Segmentation fault (core dumped) $ it isnt exploitable, as the buffer is modified before it segv's. enthh
Current thread:
- man -K overflow enthh () FLASH NET (Feb 14)
- Re: man -K overflow Knud Erik Højgaard - CyberCity Support (Feb 18)
- Re: man -K overflow Rodrigo Barbosa (aka morcego) (Feb 19)
- Re: man -K overflow Enrique Maglietta (Feb 19)
- Re: man -K overflow Arturo Busleiman (Feb 19)
- Re: man -K overflow Petr Hrbek (Feb 19)
- Re: man -K overflow Thomas Cannon (Feb 19)
- Re: man -K overflow Damian Menscher (Feb 19)
- Re: man -K overflow enthh () FLASH NET (Feb 19)
- Re: man -K overflow Rodrigo Barbosa (aka morcego) (Feb 19)
- Re: man -K overflow Knud Erik Højgaard - CyberCity Support (Feb 18)
- <Possible follow-ups>
- Re: man -K overflow Techno Bob (Feb 20)