[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040519041049.1717.qmail@www.securityfocus.com>
Date: 19 May 2004 04:10:49 -0000
From: <noderat@...mail.com>
To: bugtraq@...urityfocus.com
Subject: Re: Buffer Overflow in ActivePerl ?
In-Reply-To: <40AAB885.10935.31071242@...alhost>
>Looks like full control of EIP...
>
>However, there is not likely to be a privilege escalation here unless
>perhaps a script processor on a web server can be cajoled into doing
>something with this?? (Not at all familiar with the innards of Windows
>web servers and their relationship to their CGI, etc processors...)
>
>
>--
>Nick FitzGerald
>Computer Virus Consulting Ltd.
>Ph/FAX: +64 3 3529854
>
>
Unethical intruders don't always require "privilege escalation", executing code on another system is enough, depending on the goal.
Networks where say developers are sharing source tree's and the like, placing a hostile piece of code in the central store will allow remote code execution on the developer nodes.
Other registers other than EIP can be written, depending on the version, however we need not rely on EIP to allow for a buffer overflow exploit, we don't "need" to overwrite any register in fact to execute code, only to cause a buffer overflow >;]
cheers
Powered by blists - more mailing lists