Date: Thu, 24 Apr 1997 01:41:57 -0400 From: Shadow Lord <shadow@insanity.dorm.umd.edu> To: freebsd-security@freebsd.org Subject: sperl buffer overflow Message-ID: <199704240541.BAA20967@insanity.dorm.umd.edu>
next in thread | raw e-mail | index | archive | help
I cvsupped the latest 2.2 release, and it doesn't seem to have any changes for sperl. Is this in the process of being fixed? Cory. PS - I didn't include the exploits because I know people on this list are paranoid about that. ------- Forwarded Message Date: Mon, 21 Apr 1997 16:34:41 PDT Reply-To: Deliver <deliver@FREE.POLBOX.PL> Sender: Bugtraq List <BUGTRAQ@netspace.org> From: Deliver <deliver@FREE.POLBOX.PL> Subject: Exploits for FreeBSD sperl4.036 & sperl5.00x To: BUGTRAQ@netspace.org If somebody want to test perl5.00X or perl4.036 buffer overflow exploits there are two for FreeBSD... First works on perl4.036 and the second on perl5.002 ... With a little modyfication of OFFSET value you can overflow all versions up to perl5.003 < exploit omitted>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199704240541.BAA20967>