[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    Re: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv
From:       Boris Veytsman <borisv () lk ! net>
Date:       2002-09-26 17:44:56
[Download RAW message or body]

> From: David Endler <dendler@idefense.com>
> Date: Thu, 26 Sep 2002 08:58:48 -0600 (MDT)

> 
> A proof of concept exploit for Red Hat Linux designed by zen-parse is
> attached to this message.  It packages the overflow and shellcode in
> the "%%PageOrder:" section of the PDF.
> 
> [root@victim]# ls -al /tmp/itworked 
> /bin/ls: /tmp/itworked: No such file or directory 
> [root@victim]# gv gv-exploit.pdf 
> [root@victim]# ls -al /tmp/itworked 
> - -rw-r--r-- 1 root root 0 Aug 22 16:50 /tmp/itworked
> [root@victim]# 
> 

Does not work for me:

boris@reston-0491:~/convert$ gv -v
gv 3.5.8 (debian)
boris@reston-0491:~/convert$ gv gv-exploit.pdf 
Segmentation fault
boris@reston-0491:~/convert$ ls -al /tmp/itworked
ls: /tmp/itworked: No such file or directory

-- 
Good luck

-Boris

By long-standing tradition, I take this opportunity to savage other
designers in the thin disguise of good, clean fun.
		-- P.J. Plauger, "Computer Language", 1988, April
		   Fool's column.
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic