On Mon, Feb 12, 2001 at 03:46:20PM -0800, Blake R. Swopes wrote:
> Considering what overflows the buffer (your username), it would seem that
> you'd need root access to begin with in order to craft an exploit. Am I
> wrong?

Well this could be used to gain root privileges on free shell-account
servers, which don't do the proper bounds checking and the registration
process is fully automated...

-- 
Kind regards,
Robert Varga
------------------------------------------------------------------------------
[EMAIL PROTECTED]                                          http://hq.sk/~nite/gpgkey.txt
 

PGP signature

Reply via email to