Hi,
On 01/31/2012 05:14 PM, Todd C. Miller wrote: > > joernchen is correct, it is probably still possible to exploit with > -D_FORTIFY_SOURCE=2, though it is more difficult. On systems with > ASLR and a non-executable stack it should be even harder. nasty thing is: it's a local exploit so you got nearly unlimited tries for free =). It will just be noisy in dmesg due to all the segfaults while brute forcing the right values. cheers, joernchen -- joernchen ~ Phenoelit <[email protected]> ~ C776 3F67 7B95 03BF 5344 http://www.phenoelit.de ~ A46A 7199 8B7B 756A F5AC _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
