Skip site navigation (1)Skip section navigation (2)
Date:      29 Jun 1998 09:29:47 +0200
From:      Thomas Gellekum <tg@ihf.rwth-aachen.de>
To:        Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: xlock
Message-ID:  <8790mgy8b8.fsf@ghpc6.ihf.rwth-aachen.de>
In-Reply-To: Christoph Kukulies's message of "Mon, 29 Jun 1998 09:20:05 %2B0200"
References:  <199806290632.IAA00836@gilberto.physik.RWTH-Aachen.DE> <87btrcy9s5.fsf@ghpc6.ihf.rwth-aachen.de> <19980629092005.33214@gil.physik.rwth-aachen.de>

next in thread | previous in thread | raw e-mail | index | archive | help
Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE> writes:

> On Mon, Jun 29, 1998 at 08:58:02AM +0200, Thomas Gellekum wrote:
> > Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE> writes:
> > 
> > > Alarmed by recent buffer overflow attacks on Linux machines in
> > > my vicinity (an exploit for this is available) I thought about
> > > xlock under FreeBSD and would like to know whether the
> > > security hole has been sorted out under FreeBSD 2.2.x or what
> > > measures are advised to prevent it.
> > 
> > Could you tell more about this?
> 
>  /* x86 XLOCK overflow exploit
>       by cesaro@0wned.org 4/17/97
> 
>       Original exploit framework - lpr exploit
> 
>       Usage: make xlock-exploit
>              xlock-exploit  <optional_offset>
> 
>       Assumptions: xlock is suid root, and installed in /usr/X11/bin
>   */
> 
> [complete xploit can be sent on demand]

Please do. Desmond Bagley, the maintainer of xlockmore mentioned a
security hole in Mesa with suid binaries. I don't know if it's the
same problem.

tg

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8790mgy8b8.fsf>