On Sun, Sep 29, 2002 at 10:03:36PM -0700, [EMAIL PROTECTED] wrote:
> #include <stdio.h>
> int main(int argc, char *argv[]) { char *v[] = { NULL };
> execve(argv[1], v, NULL); }
This is the linux glibc bootstrap code behaviour. main() is never
reached. It's not new either.
> This is of course, not really a security threat by any means.. It is an
> annoying bug that effects alot of things and is really not handled
> correctly in the majority of implementations.
How about not misusing exec()? 'course not, let's patch our kernels to
stop idiots from using exec()!!
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html