[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1005224010-1292274487-cardhu_decombobulator_blackberry.rim.net-495776104-@bda083.bisx.prod.on.blackberry>
Date: Mon, 13 Dec 2010 21:08:05 +0000
From: dan.j.rosenberg@...il.com
To: "Cal Leeming [Simplicity Media Ltd]" <cal.leeming@...plicitymedialtd.co.uk>,
full-disclosure-bounces@...ts.grok.org.uk,
"Ariel Biener" <ariel@...t.tau.ac.il>
Cc: leandro_lista@...tari.com.br, firebits@...ktrack.com.br,
bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] Linux kernel exploit
Please don't inundate me with e-mail because none of you bothered to read the exploit header.
The exploit so far has a 100% success rate on the systems it was designed to work on.
I don't think this is rocket science. If your distribution does not compile Econet, then the exploit obviously won't be able to open an Econet socket. This includes Arch Linux, Gentoo, Fedora, Red Hat, CentOS, Slackware, and more. This doesn't mean you're not vulnerable, it just means this particular exploit won't work.
If your distro doesn't export the relevant symbols (Debian), ditto above.
If your distro has patched the Econet vulnerabilities I used to trigger this (Ubuntu), ditto above.
This was done on purpose, to avoid giving a weaponized exploit to people who shouldn't have one.
-Dan
Sent from my Verizon Wireless BlackBerry
-----Original Message-----
From: "Cal Leeming [Simplicity Media Ltd]"
<cal.leeming@...plicitymedialtd.co.uk>
Sender: full-disclosure-bounces@...ts.grok.org.uk
Date: Mon, 13 Dec 2010 20:40:45
To: Ariel Biener<ariel@...t.tau.ac.il>
Cc: <leandro_lista@...tari.com.br>; <firebits@...ktrack.com.br>; <bugtraq@...urityfocus.com>; <full-disclosure@...ts.grok.org.uk>
Subject: Re: [Full-disclosure] Linux kernel exploit
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists