Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Feb 1997 23:02:19 +0100
From:      j@uriah.heep.sax.de (J Wunsch)
To:        cmott@srv.net (Charles Mott)
Cc:        freebsd-chat@FreeBSD.ORG
Subject:   Re: Trying to understand stack overflow
Message-ID:  <Mutt.19970213230219.j@uriah.heep.sax.de>
In-Reply-To: <Pine.BSF.3.91.970213141410.6299A-100000@darkstar>; from Charles Mott on Feb 13, 1997 14:26:40 -0700
References:  <Pine.BSF.3.91.970213141410.6299A-100000@darkstar>

next in thread | previous in thread | raw e-mail | index | archive | help
As Charles Mott wrote:

> I was not aware of this method of security attack.  At least as far as the
> setlocale() vulnerability in 2.1.6 and earlier, the attacker has to be
> logged into your system.  Are there any means of attack which can bust 
> directly into your system from the internet without first logging in 
> with a password?

sendmail proudly presented the umpteenth remote root security hole
very recently.

Basically, the stack overflow attack allows for remote exploitation if
it's possible to send the eploiting data across the net.  For the
setlocale() attack, the exploiting data were required to be in a local
file already, so it required at least another security hole in advance
(or something like an anon ftp upload area).

-- 
cheers, J"org

joerg_wunsch@uriah.heep.sax.de -- http://www.sax.de/~joerg/ -- NIC: JW11-RIPE
Never trust an operating system you don't have sources for. ;-)



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Mutt.19970213230219.j>