[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.44.0312042358340.26831-100000@isec.pl>
Date: Fri, 5 Dec 2003 00:04:59 +0100 (CET)
From: Paul Starzetz <paul@...c.pl>
To: bugtraq@...urityfocus.com, <vulnwatch@...nwatch.org>,
<full-disclosure@...ts.netsys.com>
Subject: [iSEC] Linux kernel do_brk() vulnerability details
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
We have released a paper covering technical details of the do_brk() bug
and the results of our research done while writing the exploit code.
It also describes the numerous techniques we have used to create a very
effective exploit code that leads to full privilege escalation even on
systems running a kernel secured with various security patches.
It can be found at: http://isec.pl/papers/linux_kernel_do_brk.pdf
Regards,
- --
Paul Starzetz
iSEC Security Research
http://isec.pl/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE/z7vdC+8U3Z5wpu4RAkP0AKDH0sNST6CjjTmIfGTSETSAa922hgCfR3mz
tSWdaV41pn1zznrPb/8lQtA=
=VOlJ
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists