Full Disclosure mailing list archives
Re: [iputils] Integer overflow in iputils ping/ping6 tools
From: Frankie Cutlass <frankiecutlass12 () gmail com>
Date: Wed, 14 Mar 2012 15:10:36 +1030
Incorrect. Ping is setuid root but it drops privs before reaching this code path. Even if you could exploit that for root (you cant) all you would end up with is a shell as your uid and a raw socket..
Fork bombs do not run privileged, but /bin/ping is setuid root. Cheers, Paul Paul Szabo psz () maths usyd edu au http://www.maths.usyd.edu.au/u/psz/ School of Mathematics and Statistics University of Sydney Australia
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: [iputils] Integer overflow in iputils ping/ping6 tools paul . szabo (Mar 13)
- <Possible follow-ups>
- Re: [iputils] Integer overflow in iputils ping/ping6 tools Frankie Cutlass (Mar 14)
- Re: [iputils] Integer overflow in iputils ping/ping6 tools Ferenc Kovacs (Mar 14)