lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 06 Jan 2004 13:55:45 -0200
From: Alexandre Hautequest <hquest@...acorp.com.br>
To: bugtraq@...urityfocus.com
Subject: Re: Linux kernel do_mremap() proof-of-concept exploit code


Christophe Devine wrote:
> The following program can be used to test if a x86 Linux system
> is vulnerable to the do_mremap() exploit; use at your own risk.
> 
> $ cat mremap_poc.c

In my 2.6.0, machine promptly booted to bios. No root access but no OS 
available.

-- 
Alexandre Hautequest
Onda Provedor de Serviços S/A -- www.onda.com.br
Tel: +55 (41) 3025-3000
Promovendo segurança para seu negócio!

GPG Key 8CA3 8DEB 62B2 0300 BC6B  CDDD 20A5 546A B25F 4E08
www.keyserver.net KeyID B25F4E08


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ