lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.44.0312042358340.26831-100000@isec.pl>
Date: Fri, 5 Dec 2003 00:04:59 +0100 (CET)
From: Paul Starzetz <paul@...c.pl>
To: bugtraq@...urityfocus.com, <vulnwatch@...nwatch.org>,
   <full-disclosure@...ts.netsys.com>
Subject: [iSEC] Linux kernel do_brk() vulnerability details


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

We have released a paper covering technical details of the do_brk() bug
and the results of our research done while writing the exploit code. 
It also describes the numerous techniques we have used to create a very 
effective exploit code that leads to full privilege escalation even on
systems running a kernel secured with various security patches.

It can be found at: http://isec.pl/papers/linux_kernel_do_brk.pdf

Regards,

- -- 
Paul Starzetz
iSEC Security Research
http://isec.pl/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/z7vdC+8U3Z5wpu4RAkP0AKDH0sNST6CjjTmIfGTSETSAa922hgCfR3mz
tSWdaV41pn1zznrPb/8lQtA=
=VOlJ
-----END PGP SIGNATURE-----




_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ