Vulnerability Development mailing list archives

RE: /usr/sbin/sendmail


From: "Adam Gilmore" <vuln () optusnet com au>
Date: Sat, 8 Mar 2003 18:44:34 +1000

As far as I've seen with sendmail, it's just a forking daemon. Once a
client has connected, it'll fork off an extra process to handle that
client. You should be able to seer the connection in your process list.

From there it's as simple as attaching gdb (using the attach command) to
the child process and voila =)

-----Original Message-----
From: Steve () frij com [mailto:steve () frij com] 
Sent: Friday, 7 March 2003 10:29 PM
To: vuln-dev () securityfocus com
Subject: /usr/sbin/sendmail

Hi folks,

I am trying to figure out how to cause sendmail daemon to drop a core
file
during an access violation.

As far as I can see (or as far as I understand), I think the process is
multi-threaded. Hence if one of the client connections causes a
segmentation
fault, it simply dies away.

I am not sure how to attach a debugger to the process (is this even
possible).

Thanks in advance...



Current thread: