Re: Linux Buffer Overflow Security Exploits

Matthias Urlichs (smurf@noris.de)
17 Mar 1999 14:43:41 +0100


R.E.Wolff@BitWizard.nl (Rogier Wolff) writes:
> is a bit more comfortable than writing a program that continually
> tries to pass illegal arguments to system calls, because when you
> succeeed, you will crash your machine many times before you have
> an "exploit".
>
Umm, if you crash your machine by passing illegal values to syscalls then
you _have_ found an exploit.

It may one that can only be used to crash the machine, but so what?

-- 
Matthias Urlichs  |  noris network GmbH   |   smurf@noris.de  |  ICQ: 20193661
The quote was selected randomly. Really.    |      http://www.noris.de/~smurf/
-- 
I've noticed several design suggestions in your code.

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/