Vulnerability Development mailing list archives

root@(none)


From: root () SECURITYFOCUS COM (root (none))
Date: Wed, 9 Feb 2000 23:19:42 +1100


hey there !!
I was mucking around with my basic host information seeing if it was possible
to core dump my settings to detemine if a host can acually fool the the
settings for a localhost configuration e.g 127.0.0.1,by putting a heap of
characters in the configuration box offcourse you will just core dump and youre
original setting will just stay the same rideing the dump but if you then
return and do the same but removing 10 to 15 characters and then regenerate
this you will core dump but you host configeration will accept the long
charateristic commands once it has been accepted no longer will you dns accept
127.0.0.1 or youre host config,also you will no longer be localhost you will
just be root@(none).

LowteK

i'm not shure if this can be missused ! i'm looking into it further !!

Feb  6 15:37:09 (none) kernel: ibmtr: register_trdev() returned non-zero.
Feb  6 15:37:05 (none) insmod: /lib/modules/2.2.13-4mdk/net/ibmtr.o: init_module: Device or resource busy
Feb  6 15:37:06 (none) pppd[270]: bad local IP address 127.0.0.1
Feb  6 15:37:13 (none) pppd[390]: bad local IP address 127.0.0.1
Feb  6 15:37:18 (none) named[420]: Zone "" (file ): No default TTL set using SOA minimum instead
Feb  6 15:37:18 (none) named[420]: Zone "0.0.127.in-addr.arpa" (file named.local): No default TTL set using SOA minimum 
instead
Feb  6 15:37:18 (none) named[420]: master zone "0.0.127.in-addr.arpa" (IN) rejected due to errors (serial 2000020601)
Feb  6 15:37:18 (none) pppd[425]: bad local IP address 127.0.0.1
Feb  6 15:37:23 (none) pppd[527]: bad local IP address 127.0.0.1
Feb  6 15:37:28 (none) pppd[550]: bad local IP address 127.0.0.1


Current thread: