Full Disclosure mailing list archives
Re: [iputils] Integer overflow in iputils ping/ping6 tools
From: Ferenc Kovacs <tyra3l () gmail com>
Date: Wed, 14 Mar 2012 13:22:28 +0100
technically he never stated that ping keeps the elevated privileges, just that the binary itself is setuid root, which is correct. On Wed, Mar 14, 2012 at 5:40 AM, Frankie Cutlass <frankiecutlass12 () gmail com
wrote:
Incorrect. Ping is setuid root but it drops privs before reaching this code path. Even if you could exploit that for root (you cant) all you would end up with is a shell as your uid and a raw socket..
-- Ferenc Kovács @Tyr43l - http://tyrael.hu
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: [iputils] Integer overflow in iputils ping/ping6 tools paul . szabo (Mar 13)
- <Possible follow-ups>
- Re: [iputils] Integer overflow in iputils ping/ping6 tools Frankie Cutlass (Mar 14)
- Re: [iputils] Integer overflow in iputils ping/ping6 tools Ferenc Kovacs (Mar 14)