lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040518112114.HUET456352.fep04-mail.bloor.is.net.cable.rogers.com@BillDell>
From: full-disclosure at royds.net (Bill Royds)
Subject: Re: Buffer Overflow in ActivePerl ?

C:\Documents and Settings\Bill>Perl -v

This is perl, v5.8.0 built for MSWin32-x86-multi-thread
(with 1 registered patch, see perl -V for more detail)

Copyright 1987-2002, Larry Wall

Binary build 802 provided by ActiveState Corp. http://www.ActiveState.com
Built 00:54:02 Nov  8 2002


Perl may be copied only under the terms of either the Artistic License or
the
GNU General Public License, which may be found in the Perl 5 source kit.

Complete documentation for Perl, including FAQ lists, should be found on
this system using `man perl' or `perldoc perl'.  If you have access to the
Internet, point your browser at http://www.perl.com/, the Perl Home Page.


C:\Documents and Settings\Bill>perl -e "$a="A" x 256; system($a)" 


===========crashes with instruction at ox78f... Referenced memory at
0x41414141
 so it is a stqack overflow. Haven't tried to exploit it yet.


-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of
rich.sf@...ogic.com
Sent: May 17, 2004 8:59 PM
To: Oliver@...yhat.de
Cc: full-disclosure@...ts.netsys.com; bugtraq@...urityfocus.com
Subject: [Full-Disclosure] Re: Buffer Overflow in ActivePerl ?

Reproduced with 5.6.1/win95.

On Mon, 17 May 2004, Oliver@...yhat.de wrote:

> Date: Mon, 17 May 2004 22:23:56 +0200
> From: "Oliver@...yhat.de" <Oliver@...yhat.de>
> To: full-disclosure@...ts.netsys.com
> Cc: bugtraq@...urityfocus.com
> Subject: Buffer Overflow in ActivePerl ?
>
> hi folks,
>
> i played around with ActiveState's ActivePerl for Win32, and crashed
> Perl.exe with the following command:
>
> perl -e "$a="A" x 256; system($a)"
>
> I wonder if this bug isnt known?!? Because system() is a very common
> command....
> Can anybody reproduce this?
>
> I put together a little advisory on my website, including version
> information and a debugger output (Drwatson):
>
>     http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt
>
>
> PS:  Due to travel activity, i will not be able to respond to mails
> within the next 8 days!
>
> Regards,
>
> Oliver
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ