?
Solved

kernel exploit

Posted on 2006-10-30
3
Medium Priority
?
302 Views
Last Modified: 2010-04-22
hello all:

i know this is quite a wierd question to ask... but i will ask anyway
can someone show me how an exploit of CVE-2005-4605 may be achieved in c?

i'm not going to turn around and 'hack the planet'
--i'm just a curious mind that wants to learn a bit more about the kernel

the original post can be found here:
http://marc.theaimsgroup.com/?l=full-disclosure&m=113535380422339&w=2

cheers
~sean
0
Comment
Question by:loki982
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 43

Accepted Solution

by:
ravenpl earned 500 total points
ID: 17873784
Well nobody want to share the exploit, so it will not be grabbed by script-kiddies. In short
> if (len <= off+count) *eof = 1;
It's just off & count are values provided by user - If You overflow the sum of them...
0
 
LVL 3

Author Comment

by:loki982
ID: 18049799
./sry totally didn't realize
thanx
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you ever been frustrated by having to click seven times in order to retrieve a small bit of information from the web, always the same seven clicks, scrolling down and down until you reach your target? When you know the benefits of the command l…
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question