From owner-freebsd-security@FreeBSD.ORG Wed Nov 11 18:52:38 2009 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id EB7E31065670; Wed, 11 Nov 2009 18:52:38 +0000 (UTC) (envelope-from dweber@htw-saarland.de) Received: from triton.rz.uni-saarland.de (triton.rz.uni-saarland.de [134.96.7.25]) by mx1.freebsd.org (Postfix) with ESMTP id 75B178FC14; Wed, 11 Nov 2009 18:52:38 +0000 (UTC) Received: from zdve-mailx.htw-saarland.de (zdve-mailx.htw-saarland.de [134.96.208.108]) by triton.rz.uni-saarland.de (8.14.1/8.14.0) with ESMTP id nABIExNs005515; Wed, 11 Nov 2009 19:14:59 +0100 Received: from magritte.htw-saarland.de (magritte.htw-saarland.de [134.96.216.98]) by zdve-mailx.htw-saarland.de (8.13.8/8.13.8) with ESMTP id nABIEwoR014660; Wed, 11 Nov 2009 19:14:58 +0100 (CET) Date: Wed, 11 Nov 2009 19:14:48 +0100 (CET) From: Damian Weber To: "Bjoern A. Zeeb" In-Reply-To: <20091111173311.T37440@maildrop.int.zabbadoz.net> Message-ID: References: <6101e8c40907201008n62eeec05r6670a79698bc2ac7@mail.gmail.com> <20091111173311.T37440@maildrop.int.zabbadoz.net> User-Agent: Alpine 2.00 (BSF 1167 2008-08-23) MIME-Version: 1.0 Content-Type: MULTIPART/MIXED; BOUNDARY="2065465572-1911669242-1257963299=:60404" X-Virus-Scanned: clamav-milter 0.95.2 at zdve-mailx X-Virus-Status: Clean X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-3.0 (triton.rz.uni-saarland.de [134.96.7.25]); Wed, 11 Nov 2009 19:14:59 +0100 (CET) X-AntiVirus: checked by AntiVir MailGate (version: 2.1.2-14; AVE: 7.9.1.65; VDF: 7.1.6.221; host: AntiVir3) Cc: freebsd-security@freebsd.org, wkoszek@freebsd.org, Oliver Pinter Subject: Re: 2009-07-20 FreeBSD 7.2 (pecoff executable) Local Denial of Service Exploit 23 R D Shaun Colley X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Nov 2009 18:52:39 -0000 This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --2065465572-1911669242-1257963299=:60404 Content-Type: TEXT/PLAIN; charset=ISO-8859-1 Content-Transfer-Encoding: 8BIT On Wed, 11 Nov 2009, Bjoern A. Zeeb wrote: > Date: Wed, 11 Nov 2009 17:37:50 +0000 (UTC) > From: Bjoern A. Zeeb > To: Oliver Pinter > Cc: freebsd-security@freebsd.org, wkoszek@freebsd.org > Subject: Re: 2009-07-20 FreeBSD 7.2 (pecoff executable) Local Denial of > Service Exploit 23 R D Shaun Colley > > On Mon, 20 Jul 2009, Oliver Pinter wrote: > > Hi, > > > http://milw0rm.com/exploits/9206 > > has anyone actually been able to reproduce a problem scenario with > this on any supported releases (7.x or 6.x)? > > The only thing I gould get from that was: > execve returned -1, errno=8: Exec format error > FWIW, I got another result on 6.4-STABLE FreeBSD mymachine.local 6.4-STABLE FreeBSD 6.4-STABLE #6: Sat Oct 3 13:06:12 CEST 2009 root@hypercrypt.local:/usr/obj/usr/src/sys/MYMACHINE i386 $ ./pecoff MZaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaîîîîaaaa [I'm truncating here, ~3500 a's follow]aaaaa: File name too long -- Damian --2065465572-1911669242-1257963299=:60404--