lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20020929222804.A6450@hamsec.aurora.sfo.interquest.net>
From: silvio at big.net.au (silvio@....net.au)
Subject: THREATCON segv until scripts are fixed

A quick note to say that THREATCON will be inactive until we fix some scripts.

It appears that due to a buffer on the stack (env_argv) not having bounds
checking, our threatcon evaluation software segv'd -->

	cat /dev/urandom | bc script
	echo THREATCON: CAUTIOUSLY MOVING WITH EARS TO THE GROUND

foo="";i=0;while [ $i -lt 100 ]; do foo="a $foo"; ((i=$i+1)); done; export BC_ENV_ARGS=$foo; bc

apologies for bash specific features above

--
Silvio

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ