Vulnerability Development mailing list archives
FreeBSD System Call Signed Integer Buffer Overflow Vulnerability
From: omegatron () hushmail com
Date: Thu, 22 Aug 2002 18:59:13 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Has anyone tried exploiting the vulnerable system calls for this hole? Non-programmer type looking for proof of concept exploit code for this hole. Would like to provide customers with code to test for this hole. Appears this can be exploited to obtain root privs? Please see for vulnerability info: http://online.securityfocus.com/bid/5493 Any help/code would be appreciated. o. -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wl4EARECAB4FAj1llfEXHG9tZWdhdHJvbkBodXNobWFpbC5jb20ACgkQYPShwwsH0MKF QQCgmwLRFVBr/GHKT1q60alfARLG/oEAn0aFl35uq4/eTjxv0XyAAOF7RYlB =qPjn -----END PGP SIGNATURE----- Get your free encrypted email at https://www.hushmail.com
Current thread:
- FreeBSD System Call Signed Integer Buffer Overflow Vulnerability omegatron (Aug 22)