Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 24 Apr 1997 01:41:57 -0400
From:      Shadow Lord <shadow@insanity.dorm.umd.edu>
To:        freebsd-security@freebsd.org
Subject:   sperl buffer overflow
Message-ID:  <199704240541.BAA20967@insanity.dorm.umd.edu>

next in thread | raw e-mail | index | archive | help
I cvsupped the latest 2.2 release, and it doesn't seem to have any changes for 
sperl.
Is this in the process of being fixed?
Cory.
PS - I didn't include the exploits because I know people on this list are 
paranoid about that.

------- Forwarded Message

Date: 	Mon, 21 Apr 1997 16:34:41 PDT
Reply-To: Deliver <deliver@FREE.POLBOX.PL>
Sender: Bugtraq List <BUGTRAQ@netspace.org>
From: Deliver <deliver@FREE.POLBOX.PL>
Subject:      Exploits for FreeBSD sperl4.036 & sperl5.00x
To: BUGTRAQ@netspace.org

  If somebody want to test perl5.00X or perl4.036 buffer overflow exploits
there are two for FreeBSD...

  First works on perl4.036 and the second on perl5.002 ...
With a little modyfication of OFFSET value you can overflow all versions up
to perl5.003

< exploit omitted>




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199704240541.BAA20967>