Daniel B wrote:
Daniel Husand <[EMAIL PROTECTED]> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Christophe Devine wrote:
| The following program can be used to test if a x86 Linux system
| is vulnerable to the do_mremap() exploit; use at your own risk.
|
| $ cat mremap_poc.c
|
This didnt do anything on my 2.4.23-grsec kernel.
- --
Daniel
This froze my box running 2.6.0, was that the intention? (I think so..)
Regards,
Daniel.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
From what I understand, the exploit _should_ reboot the box if
vulnerable. At least, that's what happened to me, and the original
exploit poster clarified that was the exploits intention
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html