Date: Thu, 13 Feb 1997 23:02:19 +0100 From: j@uriah.heep.sax.de (J Wunsch) To: cmott@srv.net (Charles Mott) Cc: freebsd-chat@FreeBSD.ORG Subject: Re: Trying to understand stack overflow Message-ID: <Mutt.19970213230219.j@uriah.heep.sax.de> In-Reply-To: <Pine.BSF.3.91.970213141410.6299A-100000@darkstar>; from Charles Mott on Feb 13, 1997 14:26:40 -0700 References: <Pine.BSF.3.91.970213141410.6299A-100000@darkstar>
next in thread | previous in thread | raw e-mail | index | archive | help
As Charles Mott wrote: > I was not aware of this method of security attack. At least as far as the > setlocale() vulnerability in 2.1.6 and earlier, the attacker has to be > logged into your system. Are there any means of attack which can bust > directly into your system from the internet without first logging in > with a password? sendmail proudly presented the umpteenth remote root security hole very recently. Basically, the stack overflow attack allows for remote exploitation if it's possible to send the eploiting data across the net. For the setlocale() attack, the exploiting data were required to be in a local file already, so it required at least another security hole in advance (or something like an anon ftp upload area). -- cheers, J"org joerg_wunsch@uriah.heep.sax.de -- http://www.sax.de/~joerg/ -- NIC: JW11-RIPE Never trust an operating system you don't have sources for. ;-)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Mutt.19970213230219.j>