Vulnerability Development mailing list archives

Re: man -K overflow


From: Knud Erik Højgaard - CyberCity Support <kain () EGOTRIP DK>
Date: Thu, 15 Feb 2001 11:13:41 +0100

Red Hat Linux release 6.1.92 (Piglet)
Kernel 2.2.15-2.5.0 on an i586
[kain@beast kain]$ man -K `perl -e '{print "A"x"8285"}'`
Segmentation fault
[kain@beast kain]$

Med venlig hilsen

Knud Erik Højgaard <knud () cybercity dk>
Cybercity Erhvervssupport <support () erhverv cybercity dk>
http://www.cybercity.dk/support
Tlf 33 98 30 60
  -----Original Message-----
  From: VULN-DEV List [mailto:VULN-DEV () SECURITYFOCUS COM]On Behalf Of
enthh () FLASH NET
  Sent: 15. februar 2001 03:40
  To: VULN-DEV () SECURITYFOCUS COM
  Subject: man -K overflow


  man crashes when too many characters (around 8300) are passed thru the -K
option (tested in Slackware 7.0.0).

  $ man -K `perl -e '{print "A"x"8285"}'`
  Segmentation fault (core dumped)
  $

  it isnt exploitable, as the buffer is modified before it segv's.

  enthh

Current thread: