[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 15 Aug 2007 09:57:12 -0700 (PDT)
From: Joseph Hick <leet16y@...oo.com>
To: Harry Muchow <wonderfulandromeda@...il.com>,
Sebastian Wolfgarten <sebastian@...fgarten.com>
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: McAfee Virus Scan for Linux and Unix v5.10.0
Local Buffer Overflow
Imagine this...
One linux system maintained by admin. I do not have
root access but I can create and edit fles. Admin runs
virus scan. I create an exploit file. It exploits
virus scan. I get the privileges of the user running
the virus scan.
--- Harry Muchow <wonderfulandromeda@...il.com> wrote:
> > V - EXPLOIT CODE
> >
> > An exploit for this vulnerability has been
> developed but will not
> > released to the general public at this time.
>
> Don't ever release that to general public. Why would
> we like to run rm
> -rf / in such a funny way? I can type the command in
> the shell if all
> I want to do is attack myself. ;-)
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
>
http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia -
> http://secunia.com/
>
____________________________________________________________________________________
Sick sense of humor? Visit Yahoo! TV's
Comedy with an Edge to see what's on, when.
http://tv.yahoo.com/collections/222
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists