Date: 29 Jun 1998 09:29:47 +0200 From: Thomas Gellekum <tg@ihf.rwth-aachen.de> To: Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE> Cc: freebsd-security@FreeBSD.ORG Subject: Re: xlock Message-ID: <8790mgy8b8.fsf@ghpc6.ihf.rwth-aachen.de> In-Reply-To: Christoph Kukulies's message of "Mon, 29 Jun 1998 09:20:05 %2B0200" References: <199806290632.IAA00836@gilberto.physik.RWTH-Aachen.DE> <87btrcy9s5.fsf@ghpc6.ihf.rwth-aachen.de> <19980629092005.33214@gil.physik.rwth-aachen.de>
next in thread | previous in thread | raw e-mail | index | archive | help
Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE> writes: > On Mon, Jun 29, 1998 at 08:58:02AM +0200, Thomas Gellekum wrote: > > Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE> writes: > > > > > Alarmed by recent buffer overflow attacks on Linux machines in > > > my vicinity (an exploit for this is available) I thought about > > > xlock under FreeBSD and would like to know whether the > > > security hole has been sorted out under FreeBSD 2.2.x or what > > > measures are advised to prevent it. > > > > Could you tell more about this? > > /* x86 XLOCK overflow exploit > by cesaro@0wned.org 4/17/97 > > Original exploit framework - lpr exploit > > Usage: make xlock-exploit > xlock-exploit <optional_offset> > > Assumptions: xlock is suid root, and installed in /usr/X11/bin > */ > > [complete xploit can be sent on demand] Please do. Desmond Bagley, the maintainer of xlockmore mentioned a security hole in Mesa with suid binaries. I don't know if it's the same problem. tg To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8790mgy8b8.fsf>