Re: Linux Buffer Overflow Security Exploits
Matthias Urlichs (smurf@noris.de)
17 Mar 1999 14:43:41 +0100
R.E.Wolff@BitWizard.nl (Rogier Wolff) writes:
> is a bit more comfortable than writing a program that continually
> tries to pass illegal arguments to system calls, because when you
> succeeed, you will crash your machine many times before you have
> an "exploit".
>
Umm, if you crash your machine by passing illegal values to syscalls then
you _have_ found an exploit.
It may one that can only be used to crash the machine, but so what?
--
Matthias Urlichs | noris network GmbH | smurf@noris.de | ICQ: 20193661
The quote was selected randomly. Really. | http://www.noris.de/~smurf/
--
I've noticed several design suggestions in your code.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/