The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


XFree86 server overflow - exploit issues


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Sun, 16 Apr 2000 19:45:59 +0200
From: Michal Zalewski <[email protected]>
To: [email protected]
Subject: XFree86 server overflow - exploit issues

While trying to exploit this overflow, I noticed that the problem lies in
_lovely_ strcpy() call, which overwrites stack. Unfortunately, any
'offending' non-alphanumeric characters are replaced with '_' somewhere
before. Uh, most of people will say "it's impossible to write alphanumeric
shellcode, so it is not exploitable". That's not true. Please take a note:
we don't have to put shellcode there. It might be present anywhere, eg. as
any other parameter, read from some user-specified file, or even it might
be not present at all (please refer articles on defeating non-executable
stack). All we need is to modify some ptr (and we don't have to modify
whole address, maybe only one byte) on stack, or alter some variable -
Xserver is pretty complex creature and we have wonderful playfield here. I
strongly believe it's exploitable for average code hacker within hour or
so. Please think twice before assuming it is not - because for sure it
is _worth_ an exploit :) We're currently working on it, but it isn't
probably the best idea to post it for public (script kitties ;).

_______________________________________________________
Michal Zalewski [[email protected]] [tp.internet/security]
[http://lcamtuf.na.export.pl&#093; <=--=> bash$ :(){ :|:&};:
=-----=> God is real, unless declared integer. <=-----=

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру