Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 13 Mar 2001 17:15:16 +0000
From:      Ian Dowse <iedowse@maths.tcd.ie>
To:        Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
Cc:        security@freebsd.org, iedowse@maths.tcd.ie
Subject:   Re: rwhod 
Message-ID:   <200103131715.aa18169@salmon.maths.tcd.ie>
In-Reply-To: Your message of "Tue, 13 Mar 2001 11:44:24 EST." <200103131644.LAA73764@khavrinen.lcs.mit.edu> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <200103131644.LAA73764@khavrinen.lcs.mit.edu>, Garrett Wollman write
>
>If, on the other hand, this bug is actually exploitable, that would be
>much more serious (and would warrant a reissue of the advisory).

I am pretty certain that there is nothing exploitable about this
bug. The code ends up doing something like:

	int *p = &local_variable;

	for (;;) {
		p[4] = ntohl(p[4]);
		p[5] = ntohl(p[5]);
		p += 6;
	}

The variable `p' is a register variable in the dissassembly I looked
at. So this simply scans forward through the stack byte-swapping
ints, until it reaches inaccessible memory and dies.

Ian

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi? <200103131715.aa18169>