On Wed, 3 Dec 2003, John Hasler wrote:
good thread john :-) > > How does an attacker with a user-level password gain root access? > > In this case by exploiting a bug in sbrk(). The kernel developers knew > about the bug but did not believe it to be exploitable. They were wrong. > > > ...how does a buffer overflow allow root access? > > In some cases, by allowing you to overwrite a return address on the stack > of a suid program with the address of your code. This exploit is rather > more subtle than that, evidently. nice pretty pic of buffer overflow http://www.Linux-Sec.net/Kernel/ c ya alvin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]