Date: Sun, 10 Aug 1997 07:04:44 -0400 (EDT) From: Brian Mitchell <brian@firehouse.net> To: Philippe Regnauld <regnauld@deepo.prosa.dk> Cc: freebsd-security@FreeBSD.ORG Subject: Re: procfs hole Message-ID: <Pine.BSI.3.95.970810070303.18646A-100000@shell.firehouse.net> In-Reply-To: <19970810123747.52460@deepo.prosa.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 10 Aug 1997, Philippe Regnauld wrote: > Philippe Regnauld writes: > > > Has anyone tried with 2.2.2 ? > > Finally got hold of a 2.2.2 box: it works too :-( The exploit, as written, does not work on OpenBSD. You need a whole new signature in openbsd to even locate the setuid() stub (syscalls are done via a interrupt in OpenBSD, not a lcall as in FreeBSD). Add to that the fact that openbsd lacks a map proc entry, and it makes things annoying at best.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSI.3.95.970810070303.18646A-100000>