RE: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Boris,

> Does not work for me:
> 
> boris@reston-0491:~/convert$ gv -v
> gv 3.5.8 (debian)
> boris@reston-0491:~/convert$ gv gv-exploit.pdf 
> Segmentation fault
> boris@reston-0491:~/convert$ ls -al /tmp/itworked
> ls: /tmp/itworked: No such file or directory

I'll quote from the advisory:

"A proof of concept exploit for Red Hat Linux designed by zen-parse
is..."
                                ^^^^^^^^^^^^^

Other OS specific exploits (i.e. Debian, etc.) with the proper
alignments and offsets I imagine would be trivial to create.

- -dave

David Endler, CISSP
Director, Technical Intelligence
iDEFENSE, Inc.
14151 Newbrook Drive
Suite 100
Chantilly, VA 20151
voice: 703-344-2632
fax: 703-961-1071

dendler@idefense.com
www.idefense.com

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1.2
Comment: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x4B0ACC2A

iQA/AwUBPZNNy0rdNYRLCswqEQKl2QCffXscc4fz8HreXgVRMnXtPa3r9u4An2xY
Tkg2H+btMUk0zd4/Vy/u9iru
=b6Oz
-----END PGP SIGNATURE-----


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux