Solved

kernel exploit

Posted on 2006-10-30
3
282 Views
Last Modified: 2010-04-22
hello all:

i know this is quite a wierd question to ask... but i will ask anyway
can someone show me how an exploit of CVE-2005-4605 may be achieved in c?

i'm not going to turn around and 'hack the planet'
--i'm just a curious mind that wants to learn a bit more about the kernel

the original post can be found here:
http://marc.theaimsgroup.com/?l=full-disclosure&m=113535380422339&w=2

cheers
~sean
0
Comment
Question by:loki982
3 Comments
 
LVL 43

Accepted Solution

by:
ravenpl earned 125 total points
ID: 17873784
Well nobody want to share the exploit, so it will not be grabbed by script-kiddies. In short
> if (len <= off+count) *eof = 1;
It's just off & count are values provided by user - If You overflow the sum of them...
0
 
LVL 3

Author Comment

by:loki982
ID: 18049799
./sry totally didn't realize
thanx
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
script 11 137
GUI development for Ubuntu 8 215
Linux , how can I inspect a tar GZ file 3 131
RHEL 7 , I have tftp running as a process how can I run it as a service 2 77
The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now