Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Aug 1997 07:04:44 -0400 (EDT)
From:      Brian Mitchell <brian@firehouse.net>
To:        Philippe Regnauld <regnauld@deepo.prosa.dk>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: procfs hole
Message-ID:  <Pine.BSI.3.95.970810070303.18646A-100000@shell.firehouse.net>
In-Reply-To: <19970810123747.52460@deepo.prosa.dk>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 10 Aug 1997, Philippe Regnauld wrote:

> Philippe Regnauld writes:
> 
> > 	Has anyone tried with 2.2.2 ?
> 
> 	Finally got hold of a 2.2.2 box: it works too :-(

The exploit, as written, does not work on OpenBSD. You need a whole new
signature in openbsd to even locate the setuid() stub (syscalls are done
via a interrupt in OpenBSD, not a lcall as in FreeBSD).

Add to that the fact that openbsd lacks a map proc entry, and it makes
things annoying at best.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSI.3.95.970810070303.18646A-100000>