Date: Sun, 16 Oct 2005 00:47:12 -0400 From: Kris Kennaway <kris@obsecurity.org> To: Stephen Major <smajor@gmail.com> Cc: freebsd-security@freebsd.org Subject: Re: GID Games Exploits Message-ID: <20051016044712.GA27867@xor.obsecurity.org> In-Reply-To: <4351d9bd.6245f154.4f04.ffffb6ef@mx.gmail.com> References: <4351d9bd.6245f154.4f04.ffffb6ef@mx.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--k1lZvvs/B4yU6o8G Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Oct 15, 2005 at 09:39:27PM -0700, Stephen Major wrote: > It has come to my attention that there are quite a few local exploits > circling around in the private sector for GID Games. >=20 > =20 >=20 > Several of the games have vanilla stack overflows in them which can lead = to > elevation of privileges if successfully exploited. Big deal..that's why they're setgid games (which can only write to game data files) and not setuid anything important :-) Kris --k1lZvvs/B4yU6o8G Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (FreeBSD) iD8DBQFDUdtPWry0BWjoQKURAhLOAKC86UoxVK6i2FNrYtAE0f43cJguawCgsNkT 6yv1RwkvOYoo0l3qblPyyBY= =1dJk -----END PGP SIGNATURE----- --k1lZvvs/B4yU6o8G--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20051016044712.GA27867>