From owner-freebsd-amd64@FreeBSD.ORG Tue May 17 10:32:12 2005 Return-Path: Delivered-To: freebsd-amd64@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id D795216A4CE for ; Tue, 17 May 2005 10:32:12 +0000 (GMT) Received: from cannabis.dataforce.net (cannabis.dataforce.net [195.42.160.18]) by mx1.FreeBSD.org (Postfix) with ESMTP id 8472343DC4 for ; Tue, 17 May 2005 10:32:12 +0000 (GMT) (envelope-from georgi@cannabis.dataforce.net) Received: by cannabis.dataforce.net (Postfix, from userid 12794) id 505581429A; Tue, 17 May 2005 14:32:11 +0400 (MSD) Date: Tue, 17 May 2005 13:32:39 +0300 From: Georgi Guninski To: freebsd-amd64@freebsd.org Message-ID: <20050517103239.GE5188@sivokote.iziade.m$> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline header: best read with a sniffer User-Agent: Mutt/1.5.6i Subject: can someone please try this qmail exploit? X-BeenThere: freebsd-amd64@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Porting FreeBSD to the AMD64 platform List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 May 2005 10:32:13 -0000 can some please try a qmail-smtpd remote exploit on freebsd 5.4 amd64? what is needed: - freebsd 5.4 amd64 - 13GB virtual memory - ram + swap (probably less will do, not quite sure) - vanilla djb qmail - http://cr.yp.to/qmail.html (an easy way to install it is to install qmail from ports, then change in conf-groups "nofiles" to "qnofiles" and build and install vanilla qmail. vanilla qmail is important. how to reproduce: donwload the perl proggie: http://www.guninski.com/where_do_you_want_billg_to_go_today_4.html#qmlong-pubvvv7.pl (qmlong-pubvvv7.pl) start it on localhost. attach a gdb to qmail-smtpd and wait. if you get: Program received signal SIGTRAP, Trace/breakpoint trap. 0x000000000050cbac in ?? () (gdb) x/i $rip 0x50cbac: int3 (gdb) then the exploit works. notes: a lot of memory is used, so a production machine may be lagged. on an athlon64 2800+ with 1.5G ram the exploit takes about 1 hour. it was reported that with 8G ram the exploit takes about 10 minutes. there are flames on the qmail mailing list if this is a bug or not. thanks. -- georgi