lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: edstreet at street-tek.com (Ed Street)
Subject: Talk in #grsecurity

I thought I would pass this blurb along, taken on #grsecurity and the
subject was security. Just to let everyone know I am awaiting these exploits
to be released to the respected parties in due time or an apology for
falsifying these claims.

 

 

Ed

 

 

[22:22] <spender> is exec-shield in debian yet?

[22:23] <BlackNet> i had it working under debian

[22:23] <BlackNet> kernel-patch-exec-shield - Protection against stack
smashing and other attacks.

[22:23] <spender> i mean, is it in mainline debian

[22:23] <spender> ah okay

[22:23] <spender> so good i can release this exploit the day after fedora
core 2 then

[22:23] <spender> two birds with one stone

[22:24] <BlackNet> what exploit?

[22:24] <spender> i'm just lying

[22:25] <spender> it doesn't exist

[22:25] <spender> it didn't exist when i said it did months ago on the
debian list

[22:25] <spender> and it didn't exist when exec-shield was first written

[22:25] <spender> so just ignore me

[22:26] <BlackNet> so this hole was never fixed?

[22:26] <spender> brb, setting up a fake test system with a fake exec-shield
kernel to write a fake exploit

[22:30] * Joins: Method

[22:34] * BlackNet holds his breath and passes out from the excitment

[22:34] <spender> there are 2 holes really

[22:34] <spender> so i'll release just one

[22:35] <spender> and then state my intent to release the second in 3 months

[22:35] <BlackNet> care to share some details on the first one?

[22:35] <spender> nah

[22:35] <spender> well, the one is very serious

[22:35] <spender> the other is serious, but only in certain situations

[22:35] <BlackNet> who found it?

[22:36] <spender> me

[22:36] <BlackNet> well congrats

[22:36] <spender> i found it the day exec-shield was released

[22:37] <BlackNet> so when's the release date

[22:37] <spender> when would be the best time after fedora core 2 is out?

[22:37] <spender> that's what i'm waiting on

[22:37] <BlackNet> why wait?

[22:37] <spender> but i'd like for it to be installed on a couple machines
first

[22:37] <spender> so there's a real threat

[22:38] <spender> would a gtk or qt exploit be good too?

[22:38] <BlackNet> send 'em in if you have 'em

[22:38] <spender> oh i'll send it in

[22:40] <BlackNet> how many do you have that's not released?

[22:41] <spender> 2 for exec-shield

[22:41] <spender> 3 for systrace

[22:41] <spender> 1 for DTE

[22:41] <spender> ~10 for LIDS

[22:42] <BlackNet> that's alot

[22:42] <spender> oh

[22:42] <spender> 3 i think for linsec

[22:43] <BlackNet> all of these are non-reported?

[22:43] <spender> correct

[22:43] <spender> well

[22:43] <spender> 1 lids and DTE bug i released recently

[22:43] <BlackNet> wow you do some work

[22:43] <spender> to a channel of blackhats

[22:43] <spender> it's the same bug, just present in both

[22:44] <BlackNet> ah

[22:44] <BlackNet> so which one you going to release first?

[22:44] <spender> hmm

[22:45] <spender> i think the serious one

[22:45] <spender> so there's no chance that it can be spun in any way to
allow it to be ignored

 

 


---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.631 / Virus Database: 404 - Release Date: 3/17/2004
 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040325/d882c3ba/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ