Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 11 Nov 2009 17:37:50 +0000 (UTC)
From:      "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net>
To:        Oliver Pinter <oliver.pntr@gmail.com>
Cc:        freebsd-security@freebsd.org, wkoszek@FreeBSD.org
Subject:   Re: 2009-07-20 FreeBSD 7.2 (pecoff executable) Local Denial of Service  Exploit 23 R D Shaun Colley
Message-ID:  <20091111173311.T37440@maildrop.int.zabbadoz.net>
In-Reply-To: <6101e8c40907201008n62eeec05r6670a79698bc2ac7@mail.gmail.com>
References:  <6101e8c40907201008n62eeec05r6670a79698bc2ac7@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 20 Jul 2009, Oliver Pinter wrote:

Hi,

> http://milw0rm.com/exploits/9206

has anyone actually been able to reproduce a problem scenario with
this on any supported releases (7.x or 6.x)?

The only thing I gould get from that was:
 	execve returned -1, errno=8: Exec format error

Similar results applied to the scenario from
 	http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/80742
which had been filed for a 5.x system by Wojciech A. Koszek long
before the above.

/bz

-- 
Bjoern A. Zeeb         It will not break if you know what you are doing.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091111173311.T37440>