lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTik1McMNRC5Hc0zhxESKLFeN5nhPatSbdckMDAbb@mail.gmail.com>
Date: Mon, 13 Dec 2010 21:32:42 +0000
From: "Cal Leeming [Simplicity Media Ltd]"
	<cal.leeming@...plicitymedialtd.co.uk>
To: Ryan Sears <rdsears@....edu>
Cc: Ariel Biener <ariel@...t.tau.ac.il>, full-disclosure@...ts.grok.org.uk,
	leandro lista <leandro_lista@...tari.com.br>,
	firebits@...ktrack.com.br, bugtraq@...urityfocus.com,
	full-disclosure-bounces@...ts.grok.org.uk
Subject: Re: Linux kernel exploit

Actually Ryan, I'll think you'll find a lot of people just wanted to
contribute towards testing, as most authors will appreciate the masses
testing on as many systems as possible.

It's not a case of anyone "showing off", it's simply that a lot of people
simply don't have time to read the "small print".

On Mon, Dec 13, 2010 at 9:27 PM, Ryan Sears <rdsears@....edu> wrote:

> Hey Dan,
>
> Freaking THANK YOU first and foremost. I've been waiting for someone to say
> that for days now, and was just about to myself.
>
> Just because everyone and their brother want's to show off that they can
> compile & run some software (herp a derp, good job) DOESN'T mean they should
> immediately post it here. I tested it against an OLDER KERNEL on purpose
> because I actually read the headers and the exploit worked as expected. I
> knew that this was responsibly disclosed, so it was already patched on any
> system that I updated. If you don't have the proper symbols, then the
> exploit doesn't have the proper offsets, and the exploit will fail. Plain
> and simple. *THEN* there's people who don't even bother to read that "Red
> Hat does not support Econet by default". DOES NOT. As in the exploit WON'T
> WORK!
>
> It's pathetic that the original exploit dev has to waste his time saying
> the same thing 5 times.
>
> </rant>
>
> Ryan Sears
>
> ----- Original Message -----
> From: "dan j rosenberg" <dan.j.rosenberg@...il.com>
> To: "Cal Leeming [Simplicity Media Ltd]" <
> cal.leeming@...plicitymedialtd.co.uk>,
> full-disclosure-bounces@...ts.grok.org.uk, "Ariel Biener" <
> ariel@...t.tau.ac.il>
> Cc: "leandro lista" <leandro_lista@...tari.com.br>,
> firebits@...ktrack.com.br, bugtraq@...urityfocus.com,
> full-disclosure@...ts.grok.org.uk
> Sent: Monday, December 13, 2010 4:08:05 PM GMT -05:00 US/Canada Eastern
> Subject: Re: [Full-disclosure] Linux kernel exploit
>
> Please don't inundate me with e-mail because none of you bothered to read
> the exploit header.
>
> The exploit so far has a 100% success rate on the systems it was designed
> to work on.
>
> I don't think this is rocket science.  If your distribution does not
> compile Econet, then the exploit obviously won't be able to open an Econet
> socket.  This includes Arch Linux, Gentoo, Fedora, Red Hat, CentOS,
> Slackware, and more.  This doesn't mean you're not vulnerable, it just means
> this particular exploit won't work.
>
> If your distro doesn't export the relevant symbols (Debian), ditto above.
>
> If your distro has patched the Econet vulnerabilities I used to trigger
> this (Ubuntu), ditto above.
>
> This was done on purpose, to avoid giving a weaponized exploit to people
> who shouldn't have one.
>
> -Dan
>
>
> Sent from my Verizon Wireless BlackBerry
>
> -----Original Message-----
> From: "Cal Leeming [Simplicity Media Ltd]"
>        <cal.leeming@...plicitymedialtd.co.uk>
> Sender: full-disclosure-bounces@...ts.grok.org.uk
> Date: Mon, 13 Dec 2010 20:40:45
> To: Ariel Biener<ariel@...t.tau.ac.il>
> Cc: <leandro_lista@...tari.com.br>; <firebits@...ktrack.com.br>; <
> bugtraq@...urityfocus.com>; <full-disclosure@...ts.grok.org.uk>
> Subject: Re: [Full-disclosure] Linux kernel exploit
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 

Cal Leeming

Operational Security & Support Team

*Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
support@...plicitymedialtd.co.uk
*Fax: *+44 (02476) 578987 | *Email: *cal.leeming@...plicitymedialtd.co.uk
*IM: *AIM / ICQ / MSN / Skype (available upon request)
Simplicity Media Ltd. All rights reserved.
Registered company number 7143564

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ