Date: Wed, 11 Nov 2009 17:37:50 +0000 (UTC) From: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net> To: Oliver Pinter <oliver.pntr@gmail.com> Cc: freebsd-security@freebsd.org, wkoszek@FreeBSD.org Subject: Re: 2009-07-20 FreeBSD 7.2 (pecoff executable) Local Denial of Service Exploit 23 R D Shaun Colley Message-ID: <20091111173311.T37440@maildrop.int.zabbadoz.net> In-Reply-To: <6101e8c40907201008n62eeec05r6670a79698bc2ac7@mail.gmail.com> References: <6101e8c40907201008n62eeec05r6670a79698bc2ac7@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 20 Jul 2009, Oliver Pinter wrote: Hi, > http://milw0rm.com/exploits/9206 has anyone actually been able to reproduce a problem scenario with this on any supported releases (7.x or 6.x)? The only thing I gould get from that was: execve returned -1, errno=8: Exec format error Similar results applied to the scenario from http://www.freebsd.org/cgi/query-pr.cgi?pr=kern/80742 which had been filed for a 5.x system by Wojciech A. Koszek long before the above. /bz -- Bjoern A. Zeeb It will not break if you know what you are doing.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091111173311.T37440>