From owner-freebsd-hackers Tue Feb 25 23:10:51 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id XAA22622 for hackers-outgoing; Tue, 25 Feb 1997 23:10:51 -0800 (PST) Received: from phoenix.its.rpi.edu (dec@phoenix.its.rpi.edu [128.113.161.45]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id XAA22617 for ; Tue, 25 Feb 1997 23:10:46 -0800 (PST) Received: (from dec@localhost) by phoenix.its.rpi.edu (8.8.4/8.8.3) id CAA04697 for hackers@freebsd.org; Wed, 26 Feb 1997 02:11:14 -0500 (EST) Date: Wed, 26 Feb 1997 02:11:14 -0500 (EST) From: "David E. Cross" Message-Id: <199702260711.CAA04697@phoenix.its.rpi.edu> To: hackers@freebsd.org Subject: crt0.o hole... Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk I am finally getting arround to patching that hole... could someone tell me where a sample exploit program is? The one that was originally used against me was "crtbsd". I just want to make sure that I got it right. -- David Cross ACS Consultant