Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 16 Oct 2005 00:47:12 -0400
From:      Kris Kennaway <kris@obsecurity.org>
To:        Stephen Major <smajor@gmail.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: GID Games Exploits
Message-ID:  <20051016044712.GA27867@xor.obsecurity.org>
In-Reply-To: <4351d9bd.6245f154.4f04.ffffb6ef@mx.gmail.com>
References:  <4351d9bd.6245f154.4f04.ffffb6ef@mx.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--k1lZvvs/B4yU6o8G
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Sat, Oct 15, 2005 at 09:39:27PM -0700, Stephen Major wrote:
> It has come to my attention that there are quite a few local exploits
> circling around in the private sector for GID Games.
>=20
> =20
>=20
> Several of the games have vanilla stack overflows in them which can lead =
to
> elevation of privileges if successfully exploited.

Big deal..that's why they're setgid games (which can only write to
game data files) and not setuid anything important :-)

Kris

--k1lZvvs/B4yU6o8G
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (FreeBSD)

iD8DBQFDUdtPWry0BWjoQKURAhLOAKC86UoxVK6i2FNrYtAE0f43cJguawCgsNkT
6yv1RwkvOYoo0l3qblPyyBY=
=1dJk
-----END PGP SIGNATURE-----

--k1lZvvs/B4yU6o8G--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20051016044712.GA27867>